Loading ...

Play interactive tourEdit tour

Windows Analysis Report doa8GHSloq

Overview

General Information

Sample Name:doa8GHSloq (renamed file extension from none to exe)
Analysis ID:508792
MD5:f85ca66e06121eb29b26d78cc3f64554
SHA1:141bc2598b79d80bb3ceda6fe98c49ab7c694dd8
SHA256:2483d6141d48f387aad22f1bec5c45945bca933eb35ba13d6ff65a46b8720885
Tags:32exetrojan
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • doa8GHSloq.exe (PID: 6672 cmdline: 'C:\Users\user\Desktop\doa8GHSloq.exe' MD5: F85CA66E06121EB29B26D78CC3F64554)
    • doa8GHSloq.exe (PID: 7164 cmdline: C:\Users\user\Desktop\doa8GHSloq.exe MD5: F85CA66E06121EB29B26D78CC3F64554)
    • doa8GHSloq.exe (PID: 4820 cmdline: C:\Users\user\Desktop\doa8GHSloq.exe MD5: F85CA66E06121EB29B26D78CC3F64554)
      • schtasks.exe (PID: 3180 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpA5BD.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 3912 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5700 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpAC94.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4248 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • doa8GHSloq.exe (PID: 3860 cmdline: C:\Users\user\Desktop\doa8GHSloq.exe 0 MD5: F85CA66E06121EB29B26D78CC3F64554)
    • doa8GHSloq.exe (PID: 5356 cmdline: C:\Users\user\Desktop\doa8GHSloq.exe MD5: F85CA66E06121EB29B26D78CC3F64554)
  • dhcpmon.exe (PID: 6268 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: F85CA66E06121EB29B26D78CC3F64554)
    • dhcpmon.exe (PID: 6528 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: F85CA66E06121EB29B26D78CC3F64554)
  • dhcpmon.exe (PID: 6520 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: F85CA66E06121EB29B26D78CC3F64554)
    • dhcpmon.exe (PID: 4140 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: F85CA66E06121EB29B26D78CC3F64554)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "b4ede67b-be7e-44fd-9e96-0c0f6d15", "Group": "Default", "Domain1": "watermalon1.sytes.net", "Domain2": "", "Port": 2010, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000010.00000002.332763752.00000000045F1000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x32b8ad:$x1: NanoCore.ClientPluginHost
  • 0x35e2cd:$x1: NanoCore.ClientPluginHost
  • 0x32b8ea:$x2: IClientNetworkHost
  • 0x35e30a:$x2: IClientNetworkHost
  • 0x32f41d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0x361e3d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000010.00000002.332763752.00000000045F1000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000010.00000002.332763752.00000000045F1000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x32b615:$a: NanoCore
    • 0x32b625:$a: NanoCore
    • 0x32b859:$a: NanoCore
    • 0x32b86d:$a: NanoCore
    • 0x32b8ad:$a: NanoCore
    • 0x35e035:$a: NanoCore
    • 0x35e045:$a: NanoCore
    • 0x35e279:$a: NanoCore
    • 0x35e28d:$a: NanoCore
    • 0x35e2cd:$a: NanoCore
    • 0x32b674:$b: ClientPlugin
    • 0x32b876:$b: ClientPlugin
    • 0x32b8b6:$b: ClientPlugin
    • 0x35e094:$b: ClientPlugin
    • 0x35e296:$b: ClientPlugin
    • 0x35e2d6:$b: ClientPlugin
    • 0xba19d:$c: ProjectData
    • 0x2947cd:$c: ProjectData
    • 0x32b79b:$c: ProjectData
    • 0x35e1bb:$c: ProjectData
    • 0x32c1a2:$d: DESCrypto
    00000014.00000002.337336999.00000000029B1000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x1e62:$a: NanoCore
      • 0x1e87:$a: NanoCore
      • 0x1ee0:$a: NanoCore
      • 0x1207d:$a: NanoCore
      • 0x120a3:$a: NanoCore
      • 0x120ff:$a: NanoCore
      • 0x1ef54:$a: NanoCore
      • 0x1efad:$a: NanoCore
      • 0x1efe0:$a: NanoCore
      • 0x1f20c:$a: NanoCore
      • 0x1f288:$a: NanoCore
      • 0x1f8a1:$a: NanoCore
      • 0x1f9ea:$a: NanoCore
      • 0x1febe:$a: NanoCore
      • 0x201a5:$a: NanoCore
      • 0x201bc:$a: NanoCore
      • 0x2575a:$a: NanoCore
      • 0x257d4:$a: NanoCore
      • 0x2a371:$a: NanoCore
      • 0x2b72b:$a: NanoCore
      • 0x2b775:$a: NanoCore
      Click to see the 47 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      21.2.dhcpmon.exe.400000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      21.2.dhcpmon.exe.400000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      21.2.dhcpmon.exe.400000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        21.2.dhcpmon.exe.400000.0.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfef5:$a: NanoCore
        • 0xff05:$a: NanoCore
        • 0x10139:$a: NanoCore
        • 0x1014d:$a: NanoCore
        • 0x1018d:$a: NanoCore
        • 0xff54:$b: ClientPlugin
        • 0x10156:$b: ClientPlugin
        • 0x10196:$b: ClientPlugin
        • 0x1007b:$c: ProjectData
        • 0x10a82:$d: DESCrypto
        • 0x1844e:$e: KeepAlive
        • 0x1643c:$g: LogClientMessage
        • 0x12637:$i: get_Connected
        • 0x10db8:$j: #=q
        • 0x10de8:$j: #=q
        • 0x10e04:$j: #=q
        • 0x10e34:$j: #=q
        • 0x10e50:$j: #=q
        • 0x10e6c:$j: #=q
        • 0x10e9c:$j: #=q
        • 0x10eb8:$j: #=q
        19.2.dhcpmon.exe.423eac4.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xd9ad:$x1: NanoCore.ClientPluginHost
        • 0xd9da:$x2: IClientNetworkHost
        Click to see the 125 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\doa8GHSloq.exe, ProcessId: 4820, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\doa8GHSloq.exe, ProcessId: 4820, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\doa8GHSloq.exe, ProcessId: 4820, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\doa8GHSloq.exe, ProcessId: 4820, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000013.00000002.346641462.00000000031F1000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "b4ede67b-be7e-44fd-9e96-0c0f6d15", "Group": "Default", "Domain1": "watermalon1.sytes.net", "Domain2": "", "Port": 2010, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.423eac4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.3b2c720.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3ceeac4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3ccc720.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.486d510.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3ceeac4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.48ad510.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.494c720.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.3b2c720.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.42430ed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3ce9c8e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.4239c8e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3ccc720.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.4689c8e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.490c720.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.468eac4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.46930ed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.423eac4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.494c720.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3cf30ed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.468eac4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3a52ee0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.490c720.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3c2d510.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.3a8d510.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.46d2ee0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.4692ee0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.38b2ee0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000010.00000002.332763752.00000000045F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.340775979.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.307288504.0000000003811000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.346641462.00000000031F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.343174730.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.343983482.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.346700520.00000000041F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.352700590.0000000004641000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.352485340.0000000003641000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.343333439.0000000003CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.350478158.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.338194880.00000000039B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.327119659.0000000004631000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: doa8GHSloq.exe PID: 5356, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6528, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4140, type: MEMORYSTR
        Machine Learning detection for sampleShow sources
        Source: doa8GHSloq.exeJoe Sandbox ML: detected
        Machine Learning detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Source: 19.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 21.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 18.2.doa8GHSloq.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: doa8GHSloq.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: C:\Users\user\Desktop\doa8GHSloq.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: doa8GHSloq.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmp
        Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmp
        Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmp
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 4x nop then jmp 052D2606h
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 4x nop then jmp 052D2606h
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 4x nop then jmp 05FE2606h
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then jmp 06BF2606h
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then jmp 05882606h

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49740 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49743 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49744 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49745 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49746 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49747 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49748 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49749 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49753 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49783 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49795 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49797 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49798 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49799 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49800 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49815 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49827 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49828 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49829 -> 37.0.10.144:2010
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49830 -> 37.0.10.144:2010
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs:
        Source: Malware configuration extractorURLs: watermalon1.sytes.net
        Source: Joe Sandbox ViewASN Name: WKD-ASIE WKD-ASIE
        Source: global trafficTCP traffic: 192.168.2.3:49740 -> 37.0.10.144:2010
        Source: doa8GHSloq.exe, 00000000.00000003.282939049.0000000004CE2000.00000004.00000001.sdmp, doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpString found in binary or memory: http://google.com
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: doa8GHSloq.exe, 00000000.00000003.285253893.0000000004CE2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: doa8GHSloq.exe, 00000000.00000003.285253893.0000000004CE2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC
        Source: doa8GHSloq.exe, 00000000.00000003.285253893.0000000004CE2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC.
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: doa8GHSloq.exe, 00000000.00000003.285253893.0000000004CE2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comn-uB
        Source: doa8GHSloq.exe, 00000000.00000003.285253893.0000000004CE2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comold
        Source: doa8GHSloq.exe, 00000000.00000002.308356888.00000000058D0000.00000004.00020000.sdmp, doa8GHSloq.exe, 0000000E.00000002.331090884.0000000005D10000.00000004.00020000.sdmp, dhcpmon.exe, 00000010.00000002.336182412.00000000058A0000.00000004.00020000.sdmp, dhcpmon.exe, 00000014.00000002.337336999.00000000029B1000.00000004.00000001.sdmpString found in binary or memory: http://www.collada.org/2005/11/COLLADASchema9Done
        Source: doa8GHSloq.exe, 00000000.00000003.304111800.0000000004CE0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: doa8GHSloq.exe, 00000000.00000003.290626441.0000000004D0D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: doa8GHSloq.exe, 00000000.00000003.290270148.0000000004D0E000.00000004.00000001.sdmp, doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: doa8GHSloq.exe, 00000000.00000003.304111800.0000000004CE0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comS
        Source: doa8GHSloq.exe, 00000000.00000003.290604147.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdh
        Source: doa8GHSloq.exe, 00000000.00000003.290604147.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdw
        Source: doa8GHSloq.exe, 00000000.00000003.304111800.0000000004CE0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comt
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: doa8GHSloq.exe, 00000000.00000003.284469174.0000000004CE2000.00000004.00000001.sdmp, doa8GHSloq.exe, 00000000.00000003.284115409.0000000004CE9000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: doa8GHSloq.exe, 00000000.00000003.292887688.0000000004D0E000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmFwaQ
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/&
        Source: doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/4
        Source: doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/?
        Source: doa8GHSloq.exe, 00000000.00000003.285986174.0000000004CEF000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/M
        Source: doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/S
        Source: doa8GHSloq.exe, 00000000.00000003.285986174.0000000004CEF000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0et
        Source: doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/a
        Source: doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/d
        Source: doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/fi-fZ
        Source: doa8GHSloq.exe, 00000000.00000003.285986174.0000000004CEF000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/h
        Source: doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/M
        Source: doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/h
        Source: doa8GHSloq.exe, 00000000.00000003.286357383.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/w
        Source: doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/tali
        Source: doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/w
        Source: doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/~
        Source: doa8GHSloq.exe, 00000000.00000003.295742422.0000000004CE2000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.
        Source: doa8GHSloq.exe, 00000000.00000003.281737832.0000000004CFB000.00000004.00000001.sdmp, doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: doa8GHSloq.exe, 00000000.00000003.281737832.0000000004CFB000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comauT
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: doa8GHSloq.exe, 00000000.00000003.284641592.0000000004D1D000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com8
        Source: doa8GHSloq.exe, 00000000.00000003.284641592.0000000004D1D000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comY
        Source: doa8GHSloq.exe, 00000000.00000003.285080083.0000000004CF0000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comlic
        Source: doa8GHSloq.exe, 00000000.00000003.285080083.0000000004CF0000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comslnt8
        Source: doa8GHSloq.exe, 00000000.00000003.284641592.0000000004D1D000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comw
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: unknownDNS traffic detected: queries for: watermalon1.sytes.net
        Source: doa8GHSloq.exe, 00000000.00000002.305345383.00000000009BA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: doa8GHSloq.exe, 00000012.00000002.343174730.0000000002CA1000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.423eac4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.3b2c720.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3ceeac4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3ccc720.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.486d510.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3ceeac4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.48ad510.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.494c720.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.3b2c720.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.42430ed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3ce9c8e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.4239c8e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3ccc720.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.4689c8e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.490c720.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.468eac4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.46930ed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.423eac4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.494c720.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3cf30ed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.468eac4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3a52ee0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.490c720.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3c2d510.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.3a8d510.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.46d2ee0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.4692ee0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.38b2ee0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000010.00000002.332763752.00000000045F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.340775979.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.307288504.0000000003811000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.346641462.00000000031F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.343174730.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.343983482.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.346700520.00000000041F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.352700590.0000000004641000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.352485340.0000000003641000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.343333439.0000000003CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.350478158.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.338194880.00000000039B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.327119659.0000000004631000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: doa8GHSloq.exe PID: 5356, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6528, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4140, type: MEMORYSTR

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.dhcpmon.exe.423eac4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.doa8GHSloq.exe.3b2c720.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.doa8GHSloq.exe.3b2c720.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 10.3.doa8GHSloq.exe.421d4fe.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.doa8GHSloq.exe.3ceeac4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.3.doa8GHSloq.exe.4237555.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 20.2.dhcpmon.exe.3ccc720.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 20.2.dhcpmon.exe.3ccc720.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.2.dhcpmon.exe.3663ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.dhcpmon.exe.486d510.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.dhcpmon.exe.486d510.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 18.2.doa8GHSloq.exe.3ceeac4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.doa8GHSloq.exe.48ad510.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.doa8GHSloq.exe.48ad510.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.doa8GHSloq.exe.494c720.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.doa8GHSloq.exe.494c720.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.doa8GHSloq.exe.3b2c720.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.doa8GHSloq.exe.3b2c720.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.dhcpmon.exe.42430ed.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.doa8GHSloq.exe.3ce9c8e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.doa8GHSloq.exe.3ce9c8e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.dhcpmon.exe.4239c8e.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.dhcpmon.exe.4239c8e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 20.2.dhcpmon.exe.3ccc720.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 20.2.dhcpmon.exe.3ccc720.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 18.2.doa8GHSloq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.doa8GHSloq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.2.dhcpmon.exe.4689c8e.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.dhcpmon.exe.4689c8e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.dhcpmon.exe.490c720.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.dhcpmon.exe.490c720.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.2.dhcpmon.exe.468eac4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.dhcpmon.exe.46930ed.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.doa8GHSloq.exe.2cc38e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.3.doa8GHSloq.exe.4237555.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.3.doa8GHSloq.exe.4237555.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.dhcpmon.exe.423eac4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.dhcpmon.exe.3213ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.doa8GHSloq.exe.494c720.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.doa8GHSloq.exe.494c720.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 18.2.doa8GHSloq.exe.3cf30ed.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.dhcpmon.exe.468eac4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 20.2.dhcpmon.exe.3a52ee0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 20.2.dhcpmon.exe.3a52ee0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 10.3.doa8GHSloq.exe.421d4fe.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.3.doa8GHSloq.exe.421d4fe.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.dhcpmon.exe.490c720.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.dhcpmon.exe.490c720.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 20.2.dhcpmon.exe.3c2d510.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 20.2.dhcpmon.exe.3c2d510.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.doa8GHSloq.exe.3a8d510.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.doa8GHSloq.exe.3a8d510.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 10.3.doa8GHSloq.exe.4231b29.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.3.doa8GHSloq.exe.4231b29.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.doa8GHSloq.exe.46d2ee0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.doa8GHSloq.exe.46d2ee0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.dhcpmon.exe.4692ee0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.dhcpmon.exe.4692ee0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.doa8GHSloq.exe.38b2ee0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.doa8GHSloq.exe.38b2ee0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000002.332763752.00000000045F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000010.00000002.332763752.00000000045F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000012.00000002.340775979.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000012.00000002.340775979.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.307288504.0000000003811000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.307288504.0000000003811000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.346641462.00000000031F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000012.00000002.343174730.0000000002CA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.343983482.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000013.00000002.343983482.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.346700520.00000000041F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000002.352700590.0000000004641000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000002.352485340.0000000003641000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000012.00000002.343333439.0000000003CA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000002.350478158.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000015.00000002.350478158.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000014.00000002.338194880.00000000039B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000014.00000002.338194880.00000000039B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.327119659.0000000004631000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000002.327119659.0000000004631000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: doa8GHSloq.exe PID: 4820, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: doa8GHSloq.exe PID: 5356, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: doa8GHSloq.exe PID: 5356, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 6528, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 6528, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 4140, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 4140, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: doa8GHSloq.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.dhcpmon.exe.423eac4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.dhcpmon.exe.423eac4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.doa8GHSloq.exe.3b2c720.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.doa8GHSloq.exe.3b2c720.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.doa8GHSloq.exe.3b2c720.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 10.3.doa8GHSloq.exe.421d4fe.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 10.3.doa8GHSloq.exe.421d4fe.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 18.2.doa8GHSloq.exe.3ceeac4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.doa8GHSloq.exe.3ceeac4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 10.3.doa8GHSloq.exe.4237555.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 10.3.doa8GHSloq.exe.4237555.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 20.2.dhcpmon.exe.3ccc720.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 20.2.dhcpmon.exe.3ccc720.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 20.2.dhcpmon.exe.3ccc720.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.2.dhcpmon.exe.3663ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.dhcpmon.exe.3663ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.dhcpmon.exe.486d510.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.dhcpmon.exe.486d510.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 18.2.doa8GHSloq.exe.3ceeac4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.doa8GHSloq.exe.3ceeac4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.doa8GHSloq.exe.48ad510.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.doa8GHSloq.exe.48ad510.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.doa8GHSloq.exe.494c720.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.doa8GHSloq.exe.494c720.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.doa8GHSloq.exe.494c720.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.doa8GHSloq.exe.3b2c720.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.doa8GHSloq.exe.3b2c720.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.doa8GHSloq.exe.3b2c720.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.dhcpmon.exe.42430ed.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.dhcpmon.exe.42430ed.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 18.2.doa8GHSloq.exe.3ce9c8e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.doa8GHSloq.exe.3ce9c8e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 18.2.doa8GHSloq.exe.3ce9c8e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.dhcpmon.exe.4239c8e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.dhcpmon.exe.4239c8e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.2.dhcpmon.exe.4239c8e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 20.2.dhcpmon.exe.3ccc720.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 20.2.dhcpmon.exe.3ccc720.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 20.2.dhcpmon.exe.3ccc720.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 18.2.doa8GHSloq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.doa8GHSloq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 18.2.doa8GHSloq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.2.dhcpmon.exe.4689c8e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.dhcpmon.exe.4689c8e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 21.2.dhcpmon.exe.4689c8e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.dhcpmon.exe.490c720.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.dhcpmon.exe.490c720.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.dhcpmon.exe.490c720.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.2.dhcpmon.exe.468eac4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.dhcpmon.exe.468eac4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 21.2.dhcpmon.exe.46930ed.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.dhcpmon.exe.46930ed.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 18.2.doa8GHSloq.exe.2cc38e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.doa8GHSloq.exe.2cc38e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 10.3.doa8GHSloq.exe.4237555.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 10.3.doa8GHSloq.exe.4237555.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 10.3.doa8GHSloq.exe.4237555.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.dhcpmon.exe.423eac4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.dhcpmon.exe.423eac4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.2.dhcpmon.exe.3213ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.dhcpmon.exe.3213ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.doa8GHSloq.exe.494c720.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.doa8GHSloq.exe.494c720.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.doa8GHSloq.exe.494c720.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 18.2.doa8GHSloq.exe.3cf30ed.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.doa8GHSloq.exe.3cf30ed.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 21.2.dhcpmon.exe.468eac4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.dhcpmon.exe.468eac4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 20.2.dhcpmon.exe.3a52ee0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 20.2.dhcpmon.exe.3a52ee0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 10.3.doa8GHSloq.exe.421d4fe.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 10.3.doa8GHSloq.exe.421d4fe.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 10.3.doa8GHSloq.exe.421d4fe.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.dhcpmon.exe.490c720.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.dhcpmon.exe.490c720.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.dhcpmon.exe.490c720.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 20.2.dhcpmon.exe.3c2d510.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 20.2.dhcpmon.exe.3c2d510.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.doa8GHSloq.exe.3a8d510.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.doa8GHSloq.exe.3a8d510.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 10.3.doa8GHSloq.exe.4231b29.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 10.3.doa8GHSloq.exe.4231b29.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 10.3.doa8GHSloq.exe.4231b29.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.doa8GHSloq.exe.46d2ee0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.doa8GHSloq.exe.46d2ee0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.dhcpmon.exe.4692ee0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.dhcpmon.exe.4692ee0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.doa8GHSloq.exe.38b2ee0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.doa8GHSloq.exe.38b2ee0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000002.332763752.00000000045F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000010.00000002.332763752.00000000045F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000012.00000002.340775979.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000012.00000002.340775979.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.307288504.0000000003811000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.307288504.0000000003811000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.346641462.00000000031F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000012.00000002.343174730.0000000002CA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.343983482.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000013.00000002.343983482.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.346700520.00000000041F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000002.352700590.0000000004641000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000002.352485340.0000000003641000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000012.00000002.343333439.0000000003CA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000002.350478158.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000015.00000002.350478158.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000014.00000002.338194880.00000000039B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000014.00000002.338194880.00000000039B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.327119659.0000000004631000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000E.00000002.327119659.0000000004631000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: doa8GHSloq.exe PID: 4820, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: doa8GHSloq.exe PID: 5356, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: doa8GHSloq.exe PID: 5356, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 6528, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 6528, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 4140, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 4140, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F1C10
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F9840
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F12A9
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F0B48
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F0099
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F4499
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F8490
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F4831
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049FA85C
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F4840
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F4988
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F7D88
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F7D87
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F89D8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F71D0
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F35D0
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F89CA
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F71C1
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F41F8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F4978
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F0AB0
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049FA610
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F4208
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049FA620
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F77B8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F37B0
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F4BD8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F4BC8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F8BC8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F37C0
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F775A
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F6B70
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F6B60
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_052D04E9
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05811C20
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05819840
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05810B48
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_058112B8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05817D88
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05814988
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_058171C1
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_058189CB
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_058171D0
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_058135D0
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_058189D8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_058135E0
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_058141F8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05817D53
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05814979
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05810099
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_0581449B
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_058144A8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_058100A8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05811C10
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05814831
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05814840
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_0581A857
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_058177A8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_058137B0
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_058177B8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_058137C0
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05814BC8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05814BD8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_0581773B
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05816B60
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05816B70
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_058112AB
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05810AB0
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05814208
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_0581A610
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_0581A620
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05FE04EA
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03260B48
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_032612B8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03261C20
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03269840
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_0326772A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03266B70
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_032677A8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_032637B0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_032677B8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_032637C0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03264BC8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03264BD8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_0326A620
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03264208
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_0326A610
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03260A4C
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_032612AA
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03260AB0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03264979
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03267D50
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03267D88
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03264988
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_032635E0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_032641F8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_032671C1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_032689CA
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_032671D0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_032635D0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_032689D8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03264831
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03261C10
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03264840
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_0326A857
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_032644A8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_032600A8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_0326449A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03260099
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_06BF04E9
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 18_2_04EE2FA8
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 18_2_04EE23A0
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 18_2_04EE306F
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_02C82FA8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_02C823A0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_02C83850
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_02C8306F
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC1C10
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC9840
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC12AA
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC0B48
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC0099
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC449A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC8490
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC4831
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BCA857
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC4840
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC4988
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC7D88
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC41F8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC89D8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC71D0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC35D0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC89CA
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC71C1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC7D78
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC4979
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC0AB0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BCA620
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BCA610
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC4208
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC77B8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC37B0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC77A8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC4BD8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC4BC8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC37C0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC6B70
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC6B60
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BC7756
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_058804EA
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_057B3850
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_057B2FA8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_057B23A0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_057B306F
        Source: doa8GHSloq.exe, 00000000.00000002.308356888.00000000058D0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameTaskNode.dll4 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 00000000.00000002.305345383.00000000009BA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 00000000.00000000.280232021.000000000023C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameICompatibleFrameworksMetadataEnt.exe8 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 00000000.00000002.308456105.00000000059A0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dll< vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 00000009.00000000.302653222.000000000036C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameICompatibleFrameworksMetadataEnt.exe8 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000A.00000000.303527814.000000000073C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameICompatibleFrameworksMetadataEnt.exe8 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000E.00000002.331090884.0000000005D10000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameTaskNode.dll4 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000E.00000000.314793914.000000000105C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameICompatibleFrameworksMetadataEnt.exe8 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 0000000E.00000002.331122001.0000000005D30000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dll< vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 00000012.00000000.324530237.00000000005CC000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameICompatibleFrameworksMetadataEnt.exe8 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 00000012.00000002.343174730.0000000002CA1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 00000012.00000002.343174730.0000000002CA1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs doa8GHSloq.exe
        Source: doa8GHSloq.exe, 00000012.00000002.343333439.0000000003CA1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs doa8GHSloq.exe
        Source: doa8GHSloq.exeBinary or memory string: OriginalFilenameICompatibleFrameworksMetadataEnt.exe8 vs doa8GHSloq.exe
        Source: doa8GHSloq.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: dhcpmon.exe.10.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\doa8GHSloq.exeFile read: C:\Users\user\Desktop\doa8GHSloq.exeJump to behavior
        Source: doa8GHSloq.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\doa8GHSloq.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\doa8GHSloq.exe 'C:\Users\user\Desktop\doa8GHSloq.exe'
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Users\user\Desktop\doa8GHSloq.exe C:\Users\user\Desktop\doa8GHSloq.exe
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Users\user\Desktop\doa8GHSloq.exe C:\Users\user\Desktop\doa8GHSloq.exe
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpA5BD.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpAC94.tmp'
        Source: unknownProcess created: C:\Users\user\Desktop\doa8GHSloq.exe C:\Users\user\Desktop\doa8GHSloq.exe 0
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Users\user\Desktop\doa8GHSloq.exe C:\Users\user\Desktop\doa8GHSloq.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Users\user\Desktop\doa8GHSloq.exe C:\Users\user\Desktop\doa8GHSloq.exe
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Users\user\Desktop\doa8GHSloq.exe C:\Users\user\Desktop\doa8GHSloq.exe
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpA5BD.tmp'
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpAC94.tmp'
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Users\user\Desktop\doa8GHSloq.exe C:\Users\user\Desktop\doa8GHSloq.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\doa8GHSloq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_04BB035A AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_04BB0323 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\doa8GHSloq.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\doa8GHSloq.exe.logJump to behavior
        Source: C:\Users\user\Desktop\doa8GHSloq.exeFile created: C:\Users\user\AppData\Local\Temp\tmpA5BD.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@20/9@20/2
        Source: 21.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 21.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 18.2.doa8GHSloq.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 18.2.doa8GHSloq.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 19.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 19.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: C:\Users\user\Desktop\doa8GHSloq.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\doa8GHSloq.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\doa8GHSloq.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\doa8GHSloq.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\doa8GHSloq.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\doa8GHSloq.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\doa8GHSloq.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\doa8GHSloq.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\doa8GHSloq.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\doa8GHSloq.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: doa8GHSloqJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
        Source: C:\Users\user\Desktop\doa8GHSloq.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3912:120:WilError_01
        Source: C:\Users\user\Desktop\doa8GHSloq.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{b4ede67b-be7e-44fd-9e96-0c0f6d15978b}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4248:120:WilError_01
        Source: C:\Users\user\Desktop\doa8GHSloq.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: 18.2.doa8GHSloq.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 18.2.doa8GHSloq.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 18.2.doa8GHSloq.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 19.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 19.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 19.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 21.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 21.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 21.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: C:\Users\user\Desktop\doa8GHSloq.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: C:\Users\user\Desktop\doa8GHSloq.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: doa8GHSloq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: doa8GHSloq.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmp
        Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmp
        Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 18.2.doa8GHSloq.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 18.2.doa8GHSloq.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.2.dhcpmon.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 21.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 21.2.dhcpmon.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_0017443B push ecx; iretd
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_00172050 push 42EEF92Dh; iretd
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_001763D6 push edx; iretd
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_008F2B81 push eax; ret
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_008F29B9 push edi; ret
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_008F2EB9 push edi; ret
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_008F2CE0 push eax; ret
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_008F2A25 push edi; ret
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_008F2D35 push eax; ret
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_008F2E34 push eax; ret
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_008F2E54 push eax; ret
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_008F2A6C push ecx; ret
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_00907200 push eax; ret
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 0_2_049F5215 push eax; ret
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 9_2_002A443B push ecx; iretd
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 9_2_002A2050 push 42EEF92Dh; iretd
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 9_2_002A63D6 push edx; iretd
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_00F963D6 push edx; iretd
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_00F92050 push 42EEF92Dh; iretd
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_00F9443B push ecx; iretd
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 14_2_05815215 push eax; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_00D563D6 push edx; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_00D52050 push 42EEF92Dh; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_00D5443B push ecx; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_03265215 push eax; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 16_2_06BF275B push es; ret
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 18_2_00502050 push 42EEF92Dh; iretd
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 18_2_0050443B push ecx; iretd
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 18_2_005063D6 push edx; iretd
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 18_2_00DC2DD9 push edi; ret
        Source: C:\Users\user\Desktop\doa8GHSloq.exeCode function: 18_2_00DC2DCD push edi; ret
        Source: initial sampleStatic PE information: section name: .text entropy: 7.83365535264
        Source: initial sampleStatic PE information: section name: .text entropy: 7.83365535264
        Source: 18.2.doa8GHSloq.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 18.2.doa8GHSloq.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 19.2.dhcpmon.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 19.2.dhcpmon.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 21.2.dhcpmon.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 21.2.dhcpmon.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\doa8GHSloq.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpA5BD.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\doa8GHSloq.exeFile opened: C:\Users\user\Desktop\doa8GHSloq.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: 16.2.dhcpmon.exe.35f817c.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.281814c.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.29b817c.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.363814c.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000014.00000002.337336999.00000000029B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.306901830.0000000002811000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.331777167.00000000035F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.326343099.0000000003631000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: doa8GHSloq.exe PID: 6672, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: doa8GHSloq.exe PID: 3860, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6268, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6520, type: MEMORYSTR
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: doa8GHSloq.exe, 00000000.00000002.306901830.0000000002811000.00000004.00000001.sdmp, doa8GHSloq.exe, 0000000E.00000002.326343099.0000000003631000.00000004.00000001.sdmp, dhcpmon.exe, 00000010.00000002.331777167.00000000035F1000.00000004.00000001.sdmp, dhcpmon.exe, 00000014.00000002.337336999.00000000029B1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: doa8GHSloq.exe, 00000000.00000002.306901830.0000000002811000.00000004.00000001.sdmp, doa8GHSloq.exe, 0000000E.00000002.326343099.0000000003631000.00000004.00000001.sdmp, dhcpmon.exe, 00000010.00000002.331777167.00000000035F1000.00000004.00000001.sdmp, dhcpmon.exe, 00000014.00000002.337336999.00000000029B1000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\doa8GHSloq.exe TID: 6692Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\doa8GHSloq.exe TID: 6308Thread sleep time: -1844674407370954s >= -30000s
        Source: C:\Users\user\Desktop\doa8GHSloq.exe TID: 6308Thread sleep count: 194 > 30
        Source: C:\Users\user\Desktop\doa8GHSloq.exe TID: 6308Thread sleep count: 277 > 30
        Source: C:\Users\user\Desktop\doa8GHSloq.exe TID: 6308Thread sleep count: 31 > 30
        Source: C:\Users\user\Desktop\doa8GHSloq.exe TID: 6220Thread sleep time: -40000s >= -30000s
        Source: C:\Users\user\Desktop\doa8GHSloq.exe TID: 5568Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6212Thread sleep time: -43068s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5392Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\doa8GHSloq.exe TID: 6548Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4628Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6612Thread sleep time: -41560s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5684Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6620Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\doa8GHSloq.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\doa8GHSloq.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\doa8GHSloq.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\doa8GHSloq.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\doa8GHSloq.exeWindow / User API: foregroundWindowGot 669
        Source: C:\Users\user\Desktop\doa8GHSloq.exeWindow / User API: foregroundWindowGot 663
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\doa8GHSloq.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\doa8GHSloq.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 43068
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\doa8GHSloq.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41560
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: dhcpmon.exe, 00000014.00000002.337336999.00000000029B1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
        Source: dhcpmon.exe, 00000014.00000002.337336999.00000000029B1000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 00000014.00000002.337336999.00000000029B1000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: doa8GHSloq.exe, 0000000A.00000003.449409834.0000000000DE6000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: dhcpmon.exe, 00000014.00000002.337336999.00000000029B1000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\doa8GHSloq.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\doa8GHSloq.exeMemory written: C:\Users\user\Desktop\doa8GHSloq.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\doa8GHSloq.exeMemory written: C:\Users\user\Desktop\doa8GHSloq.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Users\user\Desktop\doa8GHSloq.exe C:\Users\user\Desktop\doa8GHSloq.exe
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Users\user\Desktop\doa8GHSloq.exe C:\Users\user\Desktop\doa8GHSloq.exe
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpA5BD.tmp'
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpAC94.tmp'
        Source: C:\Users\user\Desktop\doa8GHSloq.exeProcess created: C:\Users\user\Desktop\doa8GHSloq.exe C:\Users\user\Desktop\doa8GHSloq.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: doa8GHSloq.exe, 0000000A.00000003.449341719.0000000000E19000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\doa8GHSloq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.423eac4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.3b2c720.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3ceeac4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3ccc720.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.486d510.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3ceeac4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.48ad510.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.494c720.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.3b2c720.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.42430ed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3ce9c8e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.4239c8e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3ccc720.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.4689c8e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.490c720.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.468eac4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.46930ed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.423eac4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.494c720.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3cf30ed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.468eac4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3a52ee0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.490c720.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3c2d510.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.3a8d510.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.46d2ee0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.4692ee0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.38b2ee0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000010.00000002.332763752.00000000045F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.340775979.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.307288504.0000000003811000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.346641462.00000000031F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.343174730.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.343983482.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.346700520.00000000041F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.352700590.0000000004641000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.352485340.0000000003641000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.343333439.0000000003CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.350478158.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.338194880.00000000039B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.327119659.0000000004631000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: doa8GHSloq.exe PID: 5356, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6528, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4140, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
        Source: doa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
        Source: doa8GHSloq.exe, 00000012.00000002.340775979.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: doa8GHSloq.exe, 00000012.00000002.343174730.0000000002CA1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000013.00000002.346641462.00000000031F1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000013.00000002.346641462.00000000031F1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000015.00000002.352700590.0000000004641000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000015.00000002.352700590.0000000004641000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.423eac4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.3b2c720.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3ceeac4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3ccc720.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.486d510.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3ceeac4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.48ad510.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.494c720.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.3b2c720.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.42430ed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3ce9c8e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.4239c8e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3ccc720.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.4689c8e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.490c720.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.468eac4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.46930ed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.423eac4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.494c720.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.doa8GHSloq.exe.3cf30ed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.468eac4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3a52ee0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.490c720.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3c2d510.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.3a8d510.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.doa8GHSloq.exe.46d2ee0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.4692ee0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.doa8GHSloq.exe.38b2ee0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000010.00000002.332763752.00000000045F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.340775979.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.307288504.0000000003811000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.346641462.00000000031F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.343174730.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.343983482.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.346700520.00000000041F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.352700590.0000000004641000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.352485340.0000000003641000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.343333439.0000000003CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.350478158.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.338194880.00000000039B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.327119659.0000000004631000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: doa8GHSloq.exe PID: 5356, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6528, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4140, type: MEMORYSTR

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Access Token Manipulation1Masquerading2Input Capture21Security Software Discovery11Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection112LSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobObfuscated Files or Information3Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing13/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 508792 Sample: doa8GHSloq Startdate: 25/10/2021 Architecture: WINDOWS Score: 100 48 watermalon1.sytes.net 2->48 54 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->54 56 Found malware configuration 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 9 other signatures 2->60 9 doa8GHSloq.exe 3 2->9         started        13 doa8GHSloq.exe 2 2->13         started        15 dhcpmon.exe 3 2->15         started        17 dhcpmon.exe 2 2->17         started        signatures3 process4 file5 46 C:\Users\user\AppData\...\doa8GHSloq.exe.log, ASCII 9->46 dropped 64 Uses schtasks.exe or at.exe to add and modify task schedules 9->64 66 Injects a PE file into a foreign processes 9->66 19 doa8GHSloq.exe 1 16 9->19         started        24 doa8GHSloq.exe 9->24         started        26 doa8GHSloq.exe 2 13->26         started        28 dhcpmon.exe 2 15->28         started        30 dhcpmon.exe 2 17->30         started        signatures6 process7 dnsIp8 50 watermalon1.sytes.net 37.0.10.144, 2010, 49740, 49743 WKD-ASIE Netherlands 19->50 52 192.168.2.1 unknown unknown 19->52 40 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->40 dropped 42 C:\Users\user\AppData\Roaming\...\run.dat, data 19->42 dropped 44 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 19->44 dropped 62 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->62 32 schtasks.exe 1 19->32         started        34 schtasks.exe 1 19->34         started        file9 signatures10 process11 process12 36 conhost.exe 32->36         started        38 conhost.exe 34->38         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        doa8GHSloq.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        19.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        21.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        18.2.doa8GHSloq.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.tiro.com80%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/M0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/tali0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.collada.org/2005/11/COLLADASchema9Done0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/~0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htmFwaQ0%Avira URL Cloudsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/40%URL Reputationsafe
        watermalon1.sytes.net0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/h0%URL Reputationsafe
        http://www.carterandcone.comold0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.carterandcone.comTC.0%Avira URL Cloudsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/&0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/fi-fZ0%Avira URL Cloudsafe
        http://www.tiro.comw0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/S0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Y0et0%Avira URL Cloudsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.fontbureau.comS0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/M0%URL Reputationsafe
        http://www.fontbureau.comdw0%Avira URL Cloudsafe
        http://www.tiro.comlic0%URL Reputationsafe
        http://www.sajatypeworks.comauT0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/w0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/?0%URL Reputationsafe
        http://www.carterandcone.comn-uB0%Avira URL Cloudsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.fontbureau.comdh0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/w0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.tiro.comY0%Avira URL Cloudsafe
        http://www.monotype.0%URL Reputationsafe
        http://www.fontbureau.comt0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/h0%URL Reputationsafe
        http://www.tiro.comslnt80%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/d0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/a0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        watermalon1.sytes.net
        37.0.10.144
        truetrue
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          true
          • Avira URL Cloud: safe
          low
          watermalon1.sytes.nettrue
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.fontbureau.com/designersGdoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
            high
            http://www.fontbureau.com/designers/?doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
              high
              http://www.founder.com.cn/cn/bThedoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.tiro.com8doa8GHSloq.exe, 00000000.00000003.284641592.0000000004D1D000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designers?doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                high
                http://www.jiyu-kobo.co.jp/jp/Mdoa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp/talidoa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.tiro.comdoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designersdoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                  high
                  http://www.goodfont.co.krdoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://google.comdoa8GHSloq.exe, 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmpfalse
                    high
                    http://www.carterandcone.comdoa8GHSloq.exe, 00000000.00000003.285253893.0000000004CE2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.collada.org/2005/11/COLLADASchema9Donedoa8GHSloq.exe, 00000000.00000002.308356888.00000000058D0000.00000004.00020000.sdmp, doa8GHSloq.exe, 0000000E.00000002.331090884.0000000005D10000.00000004.00020000.sdmp, dhcpmon.exe, 00000010.00000002.336182412.00000000058A0000.00000004.00020000.sdmp, dhcpmon.exe, 00000014.00000002.337336999.00000000029B1000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/~doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.comdoa8GHSloq.exe, 00000000.00000003.281737832.0000000004CFB000.00000004.00000001.sdmp, doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmFwaQdoa8GHSloq.exe, 00000000.00000003.292887688.0000000004D0E000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.typography.netDdoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/cThedoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmdoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.comdoa8GHSloq.exe, 00000000.00000003.282939049.0000000004CE2000.00000004.00000001.sdmp, doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/4doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/jp/hdoa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comolddoa8GHSloq.exe, 00000000.00000003.285253893.0000000004CE2000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.galapagosdesign.com/DPleasedoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comTC.doa8GHSloq.exe, 00000000.00000003.285253893.0000000004CE2000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fonts.comdoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                      high
                      http://www.sandoll.co.krdoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/&doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.urwpp.deDPleasedoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.zhongyicts.com.cndoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sakkal.comdoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/fi-fZdoa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.0doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                        high
                        http://www.fontbureau.comdoa8GHSloq.exe, 00000000.00000003.304111800.0000000004CE0000.00000004.00000001.sdmpfalse
                          high
                          http://www.tiro.comwdoa8GHSloq.exe, 00000000.00000003.284641592.0000000004D1D000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/Sdoa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/Y0etdoa8GHSloq.exe, 00000000.00000003.285986174.0000000004CEF000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.carterandcone.comTCdoa8GHSloq.exe, 00000000.00000003.285253893.0000000004CE2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comSdoa8GHSloq.exe, 00000000.00000003.304111800.0000000004CE0000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/Mdoa8GHSloq.exe, 00000000.00000003.285986174.0000000004CEF000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comdwdoa8GHSloq.exe, 00000000.00000003.290604147.0000000004CED000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.tiro.comlicdoa8GHSloq.exe, 00000000.00000003.285080083.0000000004CF0000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sajatypeworks.comauTdoa8GHSloq.exe, 00000000.00000003.281737832.0000000004CFB000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/jp/doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/jp/wdoa8GHSloq.exe, 00000000.00000003.286357383.0000000004CED000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/?doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.comn-uBdoa8GHSloq.exe, 00000000.00000003.285253893.0000000004CE2000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.carterandcone.comldoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comdhdoa8GHSloq.exe, 00000000.00000003.290604147.0000000004CED000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmlNdoa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/wdoa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cndoa8GHSloq.exe, 00000000.00000003.284469174.0000000004CE2000.00000004.00000001.sdmp, doa8GHSloq.exe, 00000000.00000003.284115409.0000000004CE9000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-jones.htmldoa8GHSloq.exe, 00000000.00000003.290270148.0000000004D0E000.00000004.00000001.sdmp, doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                              high
                              http://www.tiro.comYdoa8GHSloq.exe, 00000000.00000003.284641592.0000000004D1D000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.com/designers/cabarga.htmldoa8GHSloq.exe, 00000000.00000003.290626441.0000000004D0D000.00000004.00000001.sdmpfalse
                                high
                                http://www.monotype.doa8GHSloq.exe, 00000000.00000003.295742422.0000000004CE2000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comtdoa8GHSloq.exe, 00000000.00000003.304111800.0000000004CE0000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/doa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8doa8GHSloq.exe, 00000000.00000002.308043937.0000000004EF2000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.jiyu-kobo.co.jp/hdoa8GHSloq.exe, 00000000.00000003.285986174.0000000004CEF000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.tiro.comslnt8doa8GHSloq.exe, 00000000.00000003.285080083.0000000004CF0000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/ddoa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/adoa8GHSloq.exe, 00000000.00000003.286771952.0000000004CED000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown

                                  Contacted IPs

                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs

                                  Public

                                  IPDomainCountryFlagASNASN NameMalicious
                                  37.0.10.144
                                  watermalon1.sytes.netNetherlands
                                  198301WKD-ASIEtrue

                                  Private

                                  IP
                                  192.168.2.1

                                  General Information

                                  Joe Sandbox Version:33.0.0 White Diamond
                                  Analysis ID:508792
                                  Start date:25.10.2021
                                  Start time:16:09:38
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 13m 7s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:doa8GHSloq (renamed file extension from none to exe)
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:34
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@20/9@20/2
                                  EGA Information:Failed
                                  HDC Information:
                                  • Successful, ratio: 14% (good quality ratio 9.1%)
                                  • Quality average: 40.7%
                                  • Quality standard deviation: 36.1%
                                  HCA Information:
                                  • Successful, ratio: 97%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  Warnings:
                                  Show All
                                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                  • TCP Packets have been reduced to 100
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                  • Excluded IPs from analysis (whitelisted): 20.82.209.183, 20.54.110.249, 40.112.88.60, 80.67.82.211, 80.67.82.235
                                  • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • VT rate limit hit for: /opt/package/joesandbox/database/analysis/508792/sample/doa8GHSloq.exe

                                  Simulations

                                  Behavior and APIs

                                  TimeTypeDescription
                                  16:10:40API Interceptor871x Sleep call for process: doa8GHSloq.exe modified
                                  16:10:44AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  16:10:47Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\doa8GHSloq.exe" s>$(Arg0)
                                  16:10:49Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                  16:10:52API Interceptor2x Sleep call for process: dhcpmon.exe modified

                                  Joe Sandbox View / Context

                                  IPs

                                  No context

                                  Domains

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  watermalon1.sytes.netEDG.exeGet hashmaliciousBrowse
                                  • 103.125.189.85

                                  ASN

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  WKD-ASIEOPEN_2021-10-25_09-58.exeGet hashmaliciousBrowse
                                  • 37.0.10.118
                                  CV.exeGet hashmaliciousBrowse
                                  • 37.0.10.22
                                  Debitnote-s3update.exeGet hashmaliciousBrowse
                                  • 37.0.10.22
                                  SKypfeGItc.exeGet hashmaliciousBrowse
                                  • 37.0.10.190
                                  Purchase Order.exeGet hashmaliciousBrowse
                                  • 37.0.10.22
                                  HBC.exeGet hashmaliciousBrowse
                                  • 37.0.10.15
                                  85QKQNr7mm.xlsxGet hashmaliciousBrowse
                                  • 37.0.10.15
                                  AB948F038175411DC326A1AAD83DF48D6B65632501551.exeGet hashmaliciousBrowse
                                  • 37.0.8.235
                                  FC2E04D392AB5E508FDF6C90CE456BFD0AF6DEF1F10A2.exeGet hashmaliciousBrowse
                                  • 37.0.10.214
                                  3qZB2fO4lG.exeGet hashmaliciousBrowse
                                  • 37.0.8.193
                                  365F984ABE68DDD398D7B749FB0E69B0F29DAF86F0E3E.exeGet hashmaliciousBrowse
                                  • 37.0.11.8
                                  CQUOTATION REQUEST4.scr.exeGet hashmaliciousBrowse
                                  • 37.0.10.252
                                  gy6JsH7kJx.exeGet hashmaliciousBrowse
                                  • 37.0.10.225
                                  About company.docGet hashmaliciousBrowse
                                  • 37.0.10.225
                                  SecuriteInfo.com.Virus.Win32.Save.a.26327.exeGet hashmaliciousBrowse
                                  • 37.0.10.225
                                  ifCgoV9Ykq.exeGet hashmaliciousBrowse
                                  • 37.0.10.225
                                  Agent_UDPRat.exeGet hashmaliciousBrowse
                                  • 37.0.11.171
                                  Agent_UDPRat.exeGet hashmaliciousBrowse
                                  • 37.0.11.171
                                  Order.exeGet hashmaliciousBrowse
                                  • 37.0.10.22
                                  Order.exeGet hashmaliciousBrowse
                                  • 37.0.10.22

                                  JA3 Fingerprints

                                  No context

                                  Dropped Files

                                  No context

                                  Created / dropped Files

                                  C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  Process:C:\Users\user\Desktop\doa8GHSloq.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):823808
                                  Entropy (8bit):7.825510973865646
                                  Encrypted:false
                                  SSDEEP:12288:JANTdXQBp9LbKV16MeEDyW89RQWQgZ8Wd9f8RWcz+nXUJHP4m9XQ6+0/l:iTdXQBjSeEDyWwLQO39URWL
                                  MD5:F85CA66E06121EB29B26D78CC3F64554
                                  SHA1:141BC2598B79D80BB3CEDA6FE98C49AB7C694DD8
                                  SHA-256:2483D6141D48F387AAD22F1BEC5C45945BCA933EB35BA13D6FF65A46B8720885
                                  SHA-512:53A9CAAD2DF5549538085EBAE5427634B841398FC794502FD0B3D6E3F39313D1A738C34EC95AD47F4B37C61045B8E04CDD3339EED6EDEEB5C0F91ED7C4E56FD7
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  Reputation:unknown
                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ua................................. ........@.. ....................................@.................................d...W.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......0...4...............`.............................................!3..,...&.z..+...AC.w.h-..B.$.57/1.G.1.^E..S.bn.vC.u...wH.s.......bN!U.|..:..0.>..l.J.5f.G..D..r....1........M.B........K......|=.,..g...1.b......v..V?.....O..}.dz.\....A.l0...H.......G...9V6p.c...Z......Fo..}..kN....1..m..T.......Se%\".wC(a..M..V.W.H.........z,...D.J..F..q.......1.Cb.#.e.0,..B8.F02........q+.x.#.]..0.H..w..=s..<...o'.Y.U..9@.v{...k..FE%]:.~...bd...Yc.....U.a
                                  C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                  Process:C:\Users\user\Desktop\doa8GHSloq.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Reputation:unknown
                                  Preview: [ZoneTransfer]....ZoneId=0
                                  C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                  Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):525
                                  Entropy (8bit):5.2874233355119316
                                  Encrypted:false
                                  SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                  MD5:61CCF53571C9ABA6511D696CB0D32E45
                                  SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                  SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                  SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                  Malicious:false
                                  Reputation:unknown
                                  Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                  C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\doa8GHSloq.exe.log
                                  Process:C:\Users\user\Desktop\doa8GHSloq.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):525
                                  Entropy (8bit):5.2874233355119316
                                  Encrypted:false
                                  SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                  MD5:61CCF53571C9ABA6511D696CB0D32E45
                                  SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                  SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                  SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                  Malicious:true
                                  Reputation:unknown
                                  Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                  C:\Users\user\AppData\Local\Temp\tmpAC94.tmp
                                  Process:C:\Users\user\Desktop\doa8GHSloq.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1310
                                  Entropy (8bit):5.109425792877704
                                  Encrypted:false
                                  SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                  MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                  SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                  SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                  SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                  Malicious:false
                                  Reputation:unknown
                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                  Process:C:\Users\user\Desktop\doa8GHSloq.exe
                                  File Type:data
                                  Category:modified
                                  Size (bytes):232
                                  Entropy (8bit):7.024371743172393
                                  Encrypted:false
                                  SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                  MD5:32D0AAE13696FF7F8AF33B2D22451028
                                  SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                  SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                  SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                  Malicious:false
                                  Reputation:unknown
                                  Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                  Process:C:\Users\user\Desktop\doa8GHSloq.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):8
                                  Entropy (8bit):3.0
                                  Encrypted:false
                                  SSDEEP:3:I8:I8
                                  MD5:E17438243D171CBD003AEF62A1CB4247
                                  SHA1:98F4323EDEAD9F3D1B8915669A7D782C620DF4DB
                                  SHA-256:A9A86D410BCD1CDC68D150F01C9EBD89687F43493C9B43731119DF01741DFF77
                                  SHA-512:6E91CE19E77F1463A4A8F3634F0D6B360BCD51EC4767FB5F982C7BA38CB8D2B19B93F03C039DACF39D869D9673D7B68BBBB9B26F486807D09B7E965AB0CA29D3
                                  Malicious:true
                                  Reputation:unknown
                                  Preview: .......H
                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                  Process:C:\Users\user\Desktop\doa8GHSloq.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):426840
                                  Entropy (8bit):7.999608491116724
                                  Encrypted:true
                                  SSDEEP:12288:zKf137EiDsTjevgA4p0V7njXuWSvdVU7V4OC0Rr:+134i2lp67i5d8+OCg
                                  MD5:963D5E2C9C0008DFF05518B47C367A7F
                                  SHA1:C183D601FABBC9AC8FBFA0A0937DECC677535E74
                                  SHA-256:5EACF2974C9BB2C2E24CDC651C4840DD6F4B76A98F0E85E90279F1DBB2E6F3C0
                                  SHA-512:0C04E1C1A13070D48728D9F7F300D9B26DEC6EC8875D8D3017EAD52B9EE5BDF9B651A7F0FCC537761212831107646ED72B8ED017E7477E600BC0137EF857AE2C
                                  Malicious:false
                                  Reputation:unknown
                                  Preview: ..g&jo...IPg...GM....R>i...o...I.>.&.r{....8...}...E....v.!7.u3e.. .....db...}.......".t(.xC9.cp.B....7...'.......%......w.^.._.......B.W%.<..i.0.{9.xS...5...)..w..$..C..?`F..u.5.T.X.w'Si..z.n{...Y!m...RA...xg....[7...z..9@.K.-...T..+.ACe....R....enO.....AoNMT.\^....}H&..4I...B.:..@..J...v..rI5..kP......2j....B..B.~.T..>.c..emW;Rn<9..[.r.o....R[....@=...:...L.g<.....I..%4[.G^.~.l'......v.p&.........+..S...9d/.{..H.`@.1..........f.\s...X.a.].<.h*...J4*...k.x....%3.......3.c..?%....>.!.}..)(.{...H...3..`'].Q.[sN..JX(.%pH....+......(...v.....H...3..8.a_..J..?4...y.N(..D.*h..g.jD..I...44Q?..N......oX.A......l...n?./..........$.!..;.^9"H........*...OkF....v.m_.e.v..f...."..bq{.....O.-....%R+...-..P.i..t5....2Z# ...#...,L..{..j..heT -=Z.P;...g.m)<owJ].J..../.p..8.u8.&..#.m9...j%..g&....g.x.I,....u.[....>./W...........*X...b*Z...ex.0..x.}.....Tb...[..H_M._.^N.d&...g._."@4N.pDs].GbT.......&p........Nw...%$=.....{..J.1....2....<E{..<!G..
                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                  Process:C:\Users\user\Desktop\doa8GHSloq.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):37
                                  Entropy (8bit):4.357837824971466
                                  Encrypted:false
                                  SSDEEP:3:oNWXp5vBK4JP0C:oNWXpF8EsC
                                  MD5:2EBF6D6EA84DE2782525A8EF80DCE065
                                  SHA1:5621AD39CB47B3E548BBC07CBD04D292D2C2AF46
                                  SHA-256:874B80E173A64CC41894A257147983666F52EB467E6DE3ED535A6A95D31A1EB8
                                  SHA-512:E96E402132CA8C0059CDE12ED7D3FFEF3F471C3D71AC7A224D28A8C7ADF48A1815321C73B93AB1858146E58EC8722209EDAFF8668A0F3581885C82CF4AE2AADA
                                  Malicious:false
                                  Reputation:unknown
                                  Preview: C:\Users\user\Desktop\doa8GHSloq.exe

                                  Static File Info

                                  General

                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.825510973865646
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                  • Win32 Executable (generic) a (10002005/4) 49.97%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:doa8GHSloq.exe
                                  File size:823808
                                  MD5:f85ca66e06121eb29b26d78cc3f64554
                                  SHA1:141bc2598b79d80bb3ceda6fe98c49ab7c694dd8
                                  SHA256:2483d6141d48f387aad22f1bec5c45945bca933eb35ba13d6ff65a46b8720885
                                  SHA512:53a9caad2df5549538085ebae5427634b841398fc794502fd0b3d6e3f39313d1a738c34ec95ad47f4b37c61045b8e04cdd3339eed6edeeb5c0f91ed7c4e56fd7
                                  SSDEEP:12288:JANTdXQBp9LbKV16MeEDyW89RQWQgZ8Wd9f8RWcz+nXUJHP4m9XQ6+0/l:iTdXQBjSeEDyWwLQO39URWL
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ua................................. ........@.. ....................................@................................

                                  File Icon

                                  Icon Hash:00828e8e8686b000

                                  Static PE Info

                                  General

                                  Entrypoint:0x4ca4be
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                  Time Stamp:0x6175C7B6 [Sun Oct 24 20:53:10 2021 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:v2.0.50727
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                  Entrypoint Preview

                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al

                                  Data Directories

                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xca4640x57.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xcc0000x610.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xce0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                  Sections

                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000xc84c40xc8600False0.891373109014data7.83365535264IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                  .rsrc0xcc0000x6100x800False0.32958984375data3.44849403746IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0xce0000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                  Resources

                                  NameRVASizeTypeLanguageCountry
                                  RT_VERSION0xcc0a00x384data
                                  RT_MANIFEST0xcc4240x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                  Imports

                                  DLLImport
                                  mscoree.dll_CorExeMain

                                  Version Infos

                                  DescriptionData
                                  Translation0x0000 0x04b0
                                  LegalCopyrightCopyright 2017
                                  Assembly Version1.0.0.0
                                  InternalNameICompatibleFrameworksMetadataEnt.exe
                                  FileVersion1.0.0.0
                                  CompanyName
                                  LegalTrademarks
                                  Comments
                                  ProductNameGameLibrary
                                  ProductVersion1.0.0.0
                                  FileDescriptionGameLibrary
                                  OriginalFilenameICompatibleFrameworksMetadataEnt.exe

                                  Network Behavior

                                  Snort IDS Alerts

                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  10/25/21-16:10:51.541596UDP254DNS SPOOF query response with TTL of 1 min. and no authority53580458.8.8.8192.168.2.3
                                  10/25/21-16:10:52.314567TCP2025019ET TROJAN Possible NanoCore C2 60B497402010192.168.2.337.0.10.144
                                  10/25/21-16:10:58.504752UDP254DNS SPOOF query response with TTL of 1 min. and no authority53578758.8.8.8192.168.2.3
                                  10/25/21-16:10:58.580268TCP2025019ET TROJAN Possible NanoCore C2 60B497432010192.168.2.337.0.10.144
                                  10/25/21-16:11:03.350708UDP254DNS SPOOF query response with TTL of 1 min. and no authority53541548.8.8.8192.168.2.3
                                  10/25/21-16:11:03.378268TCP2025019ET TROJAN Possible NanoCore C2 60B497442010192.168.2.337.0.10.144
                                  10/25/21-16:11:08.668535TCP2025019ET TROJAN Possible NanoCore C2 60B497452010192.168.2.337.0.10.144
                                  10/25/21-16:11:14.864387TCP2025019ET TROJAN Possible NanoCore C2 60B497462010192.168.2.337.0.10.144
                                  10/25/21-16:11:20.839143UDP254DNS SPOOF query response with TTL of 1 min. and no authority53640218.8.8.8192.168.2.3
                                  10/25/21-16:11:20.872151TCP2025019ET TROJAN Possible NanoCore C2 60B497472010192.168.2.337.0.10.144
                                  10/25/21-16:11:25.437538TCP2025019ET TROJAN Possible NanoCore C2 60B497482010192.168.2.337.0.10.144
                                  10/25/21-16:11:30.733559TCP2025019ET TROJAN Possible NanoCore C2 60B497492010192.168.2.337.0.10.144
                                  10/25/21-16:11:36.896791TCP2025019ET TROJAN Possible NanoCore C2 60B497532010192.168.2.337.0.10.144
                                  10/25/21-16:11:43.084738TCP2025019ET TROJAN Possible NanoCore C2 60B497832010192.168.2.337.0.10.144
                                  10/25/21-16:11:49.752881TCP2025019ET TROJAN Possible NanoCore C2 60B497952010192.168.2.337.0.10.144
                                  10/25/21-16:11:56.179155TCP2025019ET TROJAN Possible NanoCore C2 60B497972010192.168.2.337.0.10.144
                                  10/25/21-16:12:02.638458UDP254DNS SPOOF query response with TTL of 1 min. and no authority53603528.8.8.8192.168.2.3
                                  10/25/21-16:12:02.676677TCP2025019ET TROJAN Possible NanoCore C2 60B497982010192.168.2.337.0.10.144
                                  10/25/21-16:12:06.904246UDP254DNS SPOOF query response with TTL of 1 min. and no authority53567738.8.8.8192.168.2.3
                                  10/25/21-16:12:06.932461TCP2025019ET TROJAN Possible NanoCore C2 60B497992010192.168.2.337.0.10.144
                                  10/25/21-16:12:11.265552UDP254DNS SPOOF query response with TTL of 1 min. and no authority53609828.8.8.8192.168.2.3
                                  10/25/21-16:12:11.297453TCP2025019ET TROJAN Possible NanoCore C2 60B498002010192.168.2.337.0.10.144
                                  10/25/21-16:12:17.613531TCP2025019ET TROJAN Possible NanoCore C2 60B498152010192.168.2.337.0.10.144
                                  10/25/21-16:12:23.599804TCP2025019ET TROJAN Possible NanoCore C2 60B498272010192.168.2.337.0.10.144
                                  10/25/21-16:12:29.453867UDP254DNS SPOOF query response with TTL of 1 min. and no authority53505858.8.8.8192.168.2.3
                                  10/25/21-16:12:29.481816TCP2025019ET TROJAN Possible NanoCore C2 60B498282010192.168.2.337.0.10.144
                                  10/25/21-16:12:35.390177TCP2025019ET TROJAN Possible NanoCore C2 60B498292010192.168.2.337.0.10.144
                                  10/25/21-16:12:39.655133TCP2025019ET TROJAN Possible NanoCore C2 60B498302010192.168.2.337.0.10.144

                                  Network Port Distribution

                                  TCP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 25, 2021 16:10:51.774838924 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:51.800786972 CEST20104974037.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:51.801011086 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:52.314567089 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:52.463696003 CEST20104974037.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:52.463783979 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:52.654176950 CEST20104974037.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:52.654304981 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:52.760652065 CEST20104974037.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:52.760716915 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:52.963924885 CEST20104974037.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:52.966273069 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:53.160900116 CEST20104974037.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:53.161015987 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:53.260989904 CEST20104974037.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:53.296989918 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:53.463767052 CEST20104974037.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:53.463881969 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:53.656903028 CEST20104974037.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:53.657042980 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:53.766315937 CEST20104974037.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:53.766402006 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:53.799201965 CEST20104974037.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:53.831784964 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:53.858479977 CEST20104974037.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:53.861443043 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:53.949816942 CEST20104974037.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:53.966963053 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:54.057473898 CEST20104974037.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:54.222323895 CEST497402010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:58.535269022 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:58.579226017 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:58.579379082 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:58.580267906 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:58.621041059 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:58.621148109 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:58.760910034 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:58.760974884 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:58.787472010 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:58.809844017 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:58.964317083 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:58.964838982 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.099287033 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.100999117 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.151494980 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.202058077 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.219526052 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.219559908 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.219583988 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.219594955 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.219625950 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.219635963 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.219670057 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.245655060 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.245688915 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.245713949 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.245734930 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.245757103 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.245779037 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.245805025 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.245820045 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.245870113 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.245873928 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.245939016 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.245979071 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.264175892 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.272135973 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272173882 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272198915 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272203922 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.272229910 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.272241116 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272253990 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.272267103 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272281885 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.272291899 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272303104 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.272317886 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272339106 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.272340059 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272357941 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.272362947 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272382975 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.272386074 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272411108 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272423029 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.272433043 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272448063 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.272454977 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272473097 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.272494078 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272502899 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.272517920 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272541046 CEST20104974337.0.10.144192.168.2.3
                                  Oct 25, 2021 16:10:59.272546053 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.272569895 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:10:59.272589922 CEST497432010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:11:03.351914883 CEST497442010192.168.2.337.0.10.144
                                  Oct 25, 2021 16:11:03.377576113 CEST20104974437.0.10.144192.168.2.3
                                  Oct 25, 2021 16:11:03.377666950 CEST497442010192.168.2.337.0.10.144

                                  UDP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 25, 2021 16:10:51.521492004 CEST5804553192.168.2.38.8.8.8
                                  Oct 25, 2021 16:10:51.541595936 CEST53580458.8.8.8192.168.2.3
                                  Oct 25, 2021 16:10:58.484582901 CEST5787553192.168.2.38.8.8.8
                                  Oct 25, 2021 16:10:58.504751921 CEST53578758.8.8.8192.168.2.3
                                  Oct 25, 2021 16:11:03.329360962 CEST5415453192.168.2.38.8.8.8
                                  Oct 25, 2021 16:11:03.350708008 CEST53541548.8.8.8192.168.2.3
                                  Oct 25, 2021 16:11:08.444194078 CEST5280653192.168.2.38.8.8.8
                                  Oct 25, 2021 16:11:08.460779905 CEST53528068.8.8.8192.168.2.3
                                  Oct 25, 2021 16:11:14.816983938 CEST5391053192.168.2.38.8.8.8
                                  Oct 25, 2021 16:11:14.835227966 CEST53539108.8.8.8192.168.2.3
                                  Oct 25, 2021 16:11:20.819073915 CEST6402153192.168.2.38.8.8.8
                                  Oct 25, 2021 16:11:20.839143038 CEST53640218.8.8.8192.168.2.3
                                  Oct 25, 2021 16:11:25.388521910 CEST6078453192.168.2.38.8.8.8
                                  Oct 25, 2021 16:11:25.409646034 CEST53607848.8.8.8192.168.2.3
                                  Oct 25, 2021 16:11:30.680711031 CEST5114353192.168.2.38.8.8.8
                                  Oct 25, 2021 16:11:30.699050903 CEST53511438.8.8.8192.168.2.3
                                  Oct 25, 2021 16:11:36.781388044 CEST5902653192.168.2.38.8.8.8
                                  Oct 25, 2021 16:11:36.811371088 CEST53590268.8.8.8192.168.2.3
                                  Oct 25, 2021 16:11:43.037879944 CEST5361553192.168.2.38.8.8.8
                                  Oct 25, 2021 16:11:43.056184053 CEST53536158.8.8.8192.168.2.3
                                  Oct 25, 2021 16:11:49.647819042 CEST5377753192.168.2.38.8.8.8
                                  Oct 25, 2021 16:11:49.666081905 CEST53537778.8.8.8192.168.2.3
                                  Oct 25, 2021 16:11:56.105796099 CEST5710653192.168.2.38.8.8.8
                                  Oct 25, 2021 16:11:56.124810934 CEST53571068.8.8.8192.168.2.3
                                  Oct 25, 2021 16:12:02.618041039 CEST6035253192.168.2.38.8.8.8
                                  Oct 25, 2021 16:12:02.638458014 CEST53603528.8.8.8192.168.2.3
                                  Oct 25, 2021 16:12:06.804496050 CEST5677353192.168.2.38.8.8.8
                                  Oct 25, 2021 16:12:06.904246092 CEST53567738.8.8.8192.168.2.3
                                  Oct 25, 2021 16:12:11.245232105 CEST6098253192.168.2.38.8.8.8
                                  Oct 25, 2021 16:12:11.265552044 CEST53609828.8.8.8192.168.2.3
                                  Oct 25, 2021 16:12:17.564661980 CEST5153953192.168.2.38.8.8.8
                                  Oct 25, 2021 16:12:17.582935095 CEST53515398.8.8.8192.168.2.3
                                  Oct 25, 2021 16:12:23.551165104 CEST5539353192.168.2.38.8.8.8
                                  Oct 25, 2021 16:12:23.569952965 CEST53553938.8.8.8192.168.2.3
                                  Oct 25, 2021 16:12:29.434122086 CEST5058553192.168.2.38.8.8.8
                                  Oct 25, 2021 16:12:29.453866959 CEST53505858.8.8.8192.168.2.3
                                  Oct 25, 2021 16:12:35.343000889 CEST6345653192.168.2.38.8.8.8
                                  Oct 25, 2021 16:12:35.361471891 CEST53634568.8.8.8192.168.2.3
                                  Oct 25, 2021 16:12:39.608083963 CEST5854053192.168.2.38.8.8.8
                                  Oct 25, 2021 16:12:39.626637936 CEST53585408.8.8.8192.168.2.3

                                  DNS Queries

                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  Oct 25, 2021 16:10:51.521492004 CEST192.168.2.38.8.8.80x1039Standard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:10:58.484582901 CEST192.168.2.38.8.8.80xa444Standard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:03.329360962 CEST192.168.2.38.8.8.80xb4cStandard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:08.444194078 CEST192.168.2.38.8.8.80x58beStandard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:14.816983938 CEST192.168.2.38.8.8.80x1b05Standard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:20.819073915 CEST192.168.2.38.8.8.80xdb9dStandard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:25.388521910 CEST192.168.2.38.8.8.80x1d2bStandard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:30.680711031 CEST192.168.2.38.8.8.80xda24Standard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:36.781388044 CEST192.168.2.38.8.8.80xa24dStandard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:43.037879944 CEST192.168.2.38.8.8.80xf5c7Standard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:49.647819042 CEST192.168.2.38.8.8.80xca4fStandard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:56.105796099 CEST192.168.2.38.8.8.80x3b3aStandard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:02.618041039 CEST192.168.2.38.8.8.80xb25bStandard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:06.804496050 CEST192.168.2.38.8.8.80x8118Standard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:11.245232105 CEST192.168.2.38.8.8.80xce6cStandard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:17.564661980 CEST192.168.2.38.8.8.80xa9adStandard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:23.551165104 CEST192.168.2.38.8.8.80x4f8fStandard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:29.434122086 CEST192.168.2.38.8.8.80xa64aStandard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:35.343000889 CEST192.168.2.38.8.8.80xdaefStandard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:39.608083963 CEST192.168.2.38.8.8.80xf833Standard query (0)watermalon1.sytes.netA (IP address)IN (0x0001)

                                  DNS Answers

                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  Oct 25, 2021 16:10:51.541595936 CEST8.8.8.8192.168.2.30x1039No error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:10:58.504751921 CEST8.8.8.8192.168.2.30xa444No error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:03.350708008 CEST8.8.8.8192.168.2.30xb4cNo error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:08.460779905 CEST8.8.8.8192.168.2.30x58beNo error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:14.835227966 CEST8.8.8.8192.168.2.30x1b05No error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:20.839143038 CEST8.8.8.8192.168.2.30xdb9dNo error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:25.409646034 CEST8.8.8.8192.168.2.30x1d2bNo error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:30.699050903 CEST8.8.8.8192.168.2.30xda24No error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:36.811371088 CEST8.8.8.8192.168.2.30xa24dNo error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:43.056184053 CEST8.8.8.8192.168.2.30xf5c7No error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:49.666081905 CEST8.8.8.8192.168.2.30xca4fNo error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:11:56.124810934 CEST8.8.8.8192.168.2.30x3b3aNo error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:02.638458014 CEST8.8.8.8192.168.2.30xb25bNo error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:06.904246092 CEST8.8.8.8192.168.2.30x8118No error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:11.265552044 CEST8.8.8.8192.168.2.30xce6cNo error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:17.582935095 CEST8.8.8.8192.168.2.30xa9adNo error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:23.569952965 CEST8.8.8.8192.168.2.30x4f8fNo error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:29.453866959 CEST8.8.8.8192.168.2.30xa64aNo error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:35.361471891 CEST8.8.8.8192.168.2.30xdaefNo error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)
                                  Oct 25, 2021 16:12:39.626637936 CEST8.8.8.8192.168.2.30xf833No error (0)watermalon1.sytes.net37.0.10.144A (IP address)IN (0x0001)

                                  Code Manipulations

                                  Statistics

                                  Behavior

                                  Click to jump to process

                                  System Behavior

                                  General

                                  Start time:16:10:31
                                  Start date:25/10/2021
                                  Path:C:\Users\user\Desktop\doa8GHSloq.exe
                                  Wow64 process (32bit):true
                                  Commandline:'C:\Users\user\Desktop\doa8GHSloq.exe'
                                  Imagebase:0x170000
                                  File size:823808 bytes
                                  MD5 hash:F85CA66E06121EB29B26D78CC3F64554
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.306901830.0000000002811000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.307288504.0000000003811000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.307288504.0000000003811000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.307288504.0000000003811000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  Reputation:low

                                  General

                                  Start time:16:10:41
                                  Start date:25/10/2021
                                  Path:C:\Users\user\Desktop\doa8GHSloq.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\Desktop\doa8GHSloq.exe
                                  Imagebase:0x2a0000
                                  File size:823808 bytes
                                  MD5 hash:F85CA66E06121EB29B26D78CC3F64554
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low

                                  General

                                  Start time:16:10:42
                                  Start date:25/10/2021
                                  Path:C:\Users\user\Desktop\doa8GHSloq.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\doa8GHSloq.exe
                                  Imagebase:0x670000
                                  File size:823808 bytes
                                  MD5 hash:F85CA66E06121EB29B26D78CC3F64554
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: NanoCore, Description: unknown, Source: 0000000A.00000003.360949669.0000000004214000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  Reputation:low

                                  General

                                  Start time:16:10:45
                                  Start date:25/10/2021
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpA5BD.tmp'
                                  Imagebase:0x11d0000
                                  File size:185856 bytes
                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:16:10:45
                                  Start date:25/10/2021
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7f20f0000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:16:10:46
                                  Start date:25/10/2021
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpAC94.tmp'
                                  Imagebase:0x11d0000
                                  File size:185856 bytes
                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:16:10:47
                                  Start date:25/10/2021
                                  Path:C:\Users\user\Desktop\doa8GHSloq.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\doa8GHSloq.exe 0
                                  Imagebase:0xf90000
                                  File size:823808 bytes
                                  MD5 hash:F85CA66E06121EB29B26D78CC3F64554
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000E.00000002.326343099.0000000003631000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.327119659.0000000004631000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.327119659.0000000004631000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.327119659.0000000004631000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  Reputation:low

                                  General

                                  Start time:16:10:47
                                  Start date:25/10/2021
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7f20f0000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:16:10:50
                                  Start date:25/10/2021
                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  Wow64 process (32bit):true
                                  Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                  Imagebase:0xd50000
                                  File size:823808 bytes
                                  MD5 hash:F85CA66E06121EB29B26D78CC3F64554
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000002.332763752.00000000045F1000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.332763752.00000000045F1000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.332763752.00000000045F1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000010.00000002.331777167.00000000035F1000.00000004.00000001.sdmp, Author: Joe Security
                                  Antivirus matches:
                                  • Detection: 100%, Joe Sandbox ML
                                  Reputation:low

                                  General

                                  Start time:16:10:52
                                  Start date:25/10/2021
                                  Path:C:\Users\user\Desktop\doa8GHSloq.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\doa8GHSloq.exe
                                  Imagebase:0x500000
                                  File size:823808 bytes
                                  MD5 hash:F85CA66E06121EB29B26D78CC3F64554
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.340775979.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.340775979.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.340775979.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.343174730.0000000002CA1000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.343174730.0000000002CA1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.343333439.0000000003CA1000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.343333439.0000000003CA1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  Reputation:low

                                  General

                                  Start time:16:10:53
                                  Start date:25/10/2021
                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  Imagebase:0x7b0000
                                  File size:823808 bytes
                                  MD5 hash:F85CA66E06121EB29B26D78CC3F64554
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.346641462.00000000031F1000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.346641462.00000000031F1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.343983482.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.343983482.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.343983482.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.346700520.00000000041F1000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.346700520.00000000041F1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  Reputation:low

                                  General

                                  Start time:16:10:53
                                  Start date:25/10/2021
                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  Wow64 process (32bit):true
                                  Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                  Imagebase:0x200000
                                  File size:823808 bytes
                                  MD5 hash:F85CA66E06121EB29B26D78CC3F64554
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000014.00000002.337336999.00000000029B1000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.338194880.00000000039B1000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.338194880.00000000039B1000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.338194880.00000000039B1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  Reputation:low

                                  General

                                  Start time:16:10:56
                                  Start date:25/10/2021
                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  Imagebase:0xe00000
                                  File size:823808 bytes
                                  MD5 hash:F85CA66E06121EB29B26D78CC3F64554
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.352700590.0000000004641000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.352700590.0000000004641000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.352485340.0000000003641000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.352485340.0000000003641000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000002.350478158.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.350478158.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.350478158.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  Reputation:low

                                  Disassembly

                                  Code Analysis

                                  Reset < >