Loading ...

Play interactive tourEdit tour

Windows Analysis Report CV.exe

Overview

General Information

Sample Name:CV.exe
Analysis ID:527831
MD5:d1edb7cd80f20347fa00f25792241ea5
SHA1:63c1bffd57bb0e4cc32c53eccce4916fea2af18d
SHA256:b186f6738901b0cf5824a3e3789af05342f414f30ad10d615a2b1a4203280627
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Contains functionality to detect virtual machines (STR)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Contains functionality to detect virtual machines (SLDT)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • CV.exe (PID: 2060 cmdline: "C:\Users\user\Desktop\CV.exe" MD5: D1EDB7CD80F20347FA00F25792241EA5)
    • CV.exe (PID: 5936 cmdline: C:\Users\user\Desktop\CV.exe MD5: D1EDB7CD80F20347FA00F25792241EA5)
    • CV.exe (PID: 1464 cmdline: C:\Users\user\Desktop\CV.exe MD5: D1EDB7CD80F20347FA00F25792241EA5)
  • dhcpmon.exe (PID: 1096 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: D1EDB7CD80F20347FA00F25792241EA5)
    • dhcpmon.exe (PID: 5368 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: D1EDB7CD80F20347FA00F25792241EA5)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "f4157c11-54e5-4893-8a60-6856b847", "Group": "Default", "Domain1": "dera31.ddns.net", "Domain2": "195.133.18.211", "Port": 1187, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000F.00000002.355813819.00000000034D1000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000F.00000002.355813819.00000000034D1000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x238a7:$a: NanoCore
    • 0x23900:$a: NanoCore
    • 0x2393d:$a: NanoCore
    • 0x239b6:$a: NanoCore
    • 0x23909:$b: ClientPlugin
    • 0x23946:$b: ClientPlugin
    • 0x24244:$b: ClientPlugin
    • 0x24251:$b: ClientPlugin
    • 0x1b0fb:$e: KeepAlive
    • 0x23d91:$g: LogClientMessage
    • 0x23d11:$i: get_Connected
    • 0x158d9:$j: #=q
    • 0x15909:$j: #=q
    • 0x15945:$j: #=q
    • 0x1596d:$j: #=q
    • 0x1599d:$j: #=q
    • 0x159cd:$j: #=q
    • 0x159fd:$j: #=q
    • 0x15a2d:$j: #=q
    • 0x15a49:$j: #=q
    • 0x15a79:$j: #=q
    00000000.00000002.301343560.0000000002991000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      0000000C.00000000.297944815.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xff8d:$x1: NanoCore.ClientPluginHost
      • 0xffca:$x2: IClientNetworkHost
      • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0000000C.00000000.297944815.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 50 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        14.2.dhcpmon.exe.3107a18.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          0.2.CV.exe.3a064a0.2.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xe38d:$x1: NanoCore.ClientPluginHost
          • 0xe3ca:$x2: IClientNetworkHost
          • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          0.2.CV.exe.3a064a0.2.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0xe105:$x1: NanoCore Client.exe
          • 0xe38d:$x2: NanoCore.ClientPluginHost
          • 0xf9c6:$s1: PluginCommand
          • 0xf9ba:$s2: FileCommand
          • 0x1086b:$s3: PipeExists
          • 0x16622:$s4: PipeCreated
          • 0xe3b7:$s5: IClientLoggingHost
          0.2.CV.exe.3a064a0.2.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
            0.2.CV.exe.3a064a0.2.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
            • 0xe0f5:$a: NanoCore
            • 0xe105:$a: NanoCore
            • 0xe339:$a: NanoCore
            • 0xe34d:$a: NanoCore
            • 0xe38d:$a: NanoCore
            • 0xe154:$b: ClientPlugin
            • 0xe356:$b: ClientPlugin
            • 0xe396:$b: ClientPlugin
            • 0xe27b:$c: ProjectData
            • 0xec82:$d: DESCrypto
            • 0x1664e:$e: KeepAlive
            • 0x1463c:$g: LogClientMessage
            • 0x10837:$i: get_Connected
            • 0xefb8:$j: #=q
            • 0xefe8:$j: #=q
            • 0xf004:$j: #=q
            • 0xf034:$j: #=q
            • 0xf050:$j: #=q
            • 0xf06c:$j: #=q
            • 0xf09c:$j: #=q
            • 0xf0b8:$j: #=q
            Click to see the 84 entries

            Sigma Overview

            AV Detection:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CV.exe, ProcessId: 1464, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            E-Banking Fraud:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CV.exe, ProcessId: 1464, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Stealing of Sensitive Information:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CV.exe, ProcessId: 1464, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Remote Access Functionality:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CV.exe, ProcessId: 1464, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 0000000F.00000002.355813819.00000000034D1000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "f4157c11-54e5-4893-8a60-6856b847", "Group": "Default", "Domain1": "dera31.ddns.net", "Domain2": "195.133.18.211", "Port": 1187, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
            Multi AV Scanner detection for submitted fileShow sources
            Source: CV.exeReversingLabs: Detection: 17%
            Multi AV Scanner detection for domain / URLShow sources
            Source: dera31.ddns.netVirustotal: Detection: 6%Perma Link
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 17%
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 0.2.CV.exe.3a064a0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.3a38ec0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41a8ec0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.45195fe.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.451e434.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.4522a5d.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.451e434.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.10.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.12.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41764a0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.3a38ec0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41764a0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41a8ec0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.3a064a0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000F.00000002.355813819.00000000034D1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.297944815.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.298501077.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.335021973.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.355853296.00000000044D1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.352520108.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.340507265.0000000004101000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.299111610.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.336503359.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.297385774.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.335575660.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.337167425.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.302046756.0000000003991000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CV.exe PID: 2060, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: CV.exe PID: 1464, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1096, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5368, type: MEMORYSTR
            Machine Learning detection for sampleShow sources
            Source: CV.exeJoe Sandbox ML: detected
            Machine Learning detection for dropped fileShow sources
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
            Source: 15.0.dhcpmon.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 15.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 15.0.dhcpmon.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 15.0.dhcpmon.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 15.0.dhcpmon.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 12.0.CV.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 12.0.CV.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 12.0.CV.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 15.0.dhcpmon.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 12.0.CV.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 12.0.CV.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: CV.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: C:\Users\user\Desktop\CV.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: CV.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: \??\C:\Windows\dll\System.pdb source: CV.exe, 0000000C.00000003.318588315.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.323644556.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.322436828.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.326790180.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.313126991.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.330640079.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.328492134.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.327958304.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.327672416.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.312101298.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.319051125.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.329401851.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.310808418.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.318016742.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.320861167.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.321371126.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.330345305.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.329526189.0000000000E5C000.00000004.00000001.sdmp
            Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdbf source: CV.exe, 0000000C.00000003.318588315.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.313126991.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.312101298.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.310808418.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.318016742.0000000000E5C000.00000004.00000001.sdmp
            Source: Binary string: ll\System.pdb source: CV.exe, 0000000C.00000003.349922547.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.341098572.0000000000E5C000.00000004.00000001.sdmp
            Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: CV.exe, 0000000C.00000003.318588315.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.313126991.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.312101298.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.310808418.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.318016742.0000000000E5C000.00000004.00000001.sdmp

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49778 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49779 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49780 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49781 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49784 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49785 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49786 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49788 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49789 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49806 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49825 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49831 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49833 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49842 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49857 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49858 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49860 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49861 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49862 -> 194.85.248.250:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49863 -> 194.85.248.250:1187
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: dera31.ddns.net
            Source: Malware configuration extractorURLs: 195.133.18.211
            Uses dynamic DNS servicesShow sources
            Source: unknownDNS query: name: dera31.ddns.net
            Source: Joe Sandbox ViewASN Name: DATACENTERRO DATACENTERRO
            Source: global trafficTCP traffic: 192.168.2.3:49778 -> 194.85.248.250:1187
            Source: CV.exe, 00000000.00000003.282219078.0000000004D41000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282035992.0000000004D3D000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282292551.0000000004D3F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282009352.0000000004D36000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282194332.0000000004D3E000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282482449.0000000004D3F000.00000004.00000001.sdmpString found in binary or memory: http://en.wikipK
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: CV.exe, 00000000.00000003.282219078.0000000004D41000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282035992.0000000004D3D000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282292551.0000000004D3F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283265187.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282009352.0000000004D36000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282194332.0000000004D3E000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282482449.0000000004D3F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283180652.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282900611.0000000004D40000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: CV.exe, 00000000.00000003.282219078.0000000004D41000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.284003844.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282035992.0000000004D3D000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283348759.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283860983.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282292551.0000000004D3F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283939050.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283265187.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282009352.0000000004D36000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282194332.0000000004D3E000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282482449.0000000004D3F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283180652.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283430595.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282900611.0000000004D40000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comq
            Source: CV.exe, 00000000.00000003.282035992.0000000004D3D000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282009352.0000000004D36000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comtud
            Source: dhcpmon.exe, 0000000E.00000002.339696473.0000000003101000.00000004.00000001.sdmpString found in binary or memory: http://www.chinhdo.com
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.286008984.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.291280536.0000000004D3B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: CV.exe, 00000000.00000003.286003858.0000000004D3E000.00000004.00000001.sdmp, CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: CV.exe, 00000000.00000003.286008984.0000000004D40000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers:
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: CV.exe, 00000000.00000003.291280536.0000000004D3B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersc
            Source: CV.exe, 00000000.00000002.301271513.0000000000DA7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comB.TTF
            Source: CV.exe, 00000000.00000002.301271513.0000000000DA7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.coma
            Source: CV.exe, 00000000.00000002.301271513.0000000000DA7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.commm
            Source: CV.exe, 00000000.00000002.301271513.0000000000DA7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comrsiva
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
            Source: CV.exe, 00000000.00000003.280984150.0000000004D32000.00000004.00000001.sdmp, CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.280622676.0000000004D6D000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.281055683.0000000004D3F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.280672982.0000000004D6D000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: CV.exe, 00000000.00000003.280585140.0000000004D32000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnsq
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: CV.exe, 00000000.00000003.280424188.0000000004D34000.00000004.00000001.sdmp, CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: CV.exe, 00000000.00000003.280424188.0000000004D34000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.krf
            Source: CV.exe, 00000000.00000003.282537391.0000000000DAB000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: CV.exe, 00000000.00000003.282537391.0000000000DAB000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/J
            Source: CV.exe, 00000000.00000003.282537391.0000000000DAB000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Vers
            Source: CV.exe, 00000000.00000003.282537391.0000000000DAB000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Vet
            Source: CV.exe, 00000000.00000003.282537391.0000000000DAB000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/s
            Source: CV.exe, 00000000.00000003.288732810.0000000004D4A000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.H
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: CV.exe, 00000000.00000003.283348759.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283430595.0000000004D40000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
            Source: CV.exe, 00000000.00000003.280424188.0000000004D34000.00000004.00000001.sdmp, CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.281296877.0000000004D6D000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
            Source: CV.exe, 00000000.00000003.281731971.0000000004D6E000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.281205165.0000000004D6E000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.281296877.0000000004D6D000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com(
            Source: CV.exe, 00000000.00000003.280984150.0000000004D32000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comfi-f
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: unknownDNS traffic detected: queries for: dera31.ddns.net
            Source: CV.exe, 00000000.00000002.300907351.0000000000A8A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: dhcpmon.exe, 0000000F.00000002.355813819.00000000034D1000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

            E-Banking Fraud:

            barindex
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 0.2.CV.exe.3a064a0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.3a38ec0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41a8ec0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.45195fe.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.451e434.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.4522a5d.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.451e434.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.10.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.12.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41764a0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.3a38ec0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41764a0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41a8ec0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.3a064a0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000F.00000002.355813819.00000000034D1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.297944815.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.298501077.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.335021973.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.355853296.00000000044D1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.352520108.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.340507265.0000000004101000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.299111610.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.336503359.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.297385774.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.335575660.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.337167425.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.302046756.0000000003991000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CV.exe PID: 2060, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: CV.exe PID: 1464, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1096, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5368, type: MEMORYSTR

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 0.2.CV.exe.3a064a0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.CV.exe.3a064a0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 15.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 15.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.CV.exe.3a38ec0.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.CV.exe.3a38ec0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 15.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 15.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 15.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 15.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 14.2.dhcpmon.exe.41a8ec0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 14.2.dhcpmon.exe.41a8ec0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 15.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 15.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 15.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 15.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 15.2.dhcpmon.exe.45195fe.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 15.2.dhcpmon.exe.45195fe.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 12.0.CV.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 12.0.CV.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 15.2.dhcpmon.exe.451e434.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 15.2.dhcpmon.exe.4522a5d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 15.2.dhcpmon.exe.451e434.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 12.0.CV.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 12.0.CV.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 12.0.CV.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 12.0.CV.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 15.2.dhcpmon.exe.34f3ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 15.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 15.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 12.0.CV.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 12.0.CV.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 12.0.CV.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 12.0.CV.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 14.2.dhcpmon.exe.41764a0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 14.2.dhcpmon.exe.41764a0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.CV.exe.3a38ec0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.CV.exe.3a38ec0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 14.2.dhcpmon.exe.41764a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 14.2.dhcpmon.exe.41764a0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 14.2.dhcpmon.exe.41a8ec0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 14.2.dhcpmon.exe.41a8ec0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.CV.exe.3a064a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.CV.exe.3a064a0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000F.00000002.355813819.00000000034D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000C.00000000.297944815.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000C.00000000.297944815.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000C.00000000.298501077.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000C.00000000.298501077.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000F.00000000.335021973.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000F.00000000.335021973.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000F.00000002.355853296.00000000044D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000F.00000002.352520108.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000F.00000002.352520108.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000E.00000002.340507265.0000000004101000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000E.00000002.340507265.0000000004101000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000C.00000000.299111610.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000C.00000000.299111610.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000F.00000000.336503359.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000F.00000000.336503359.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000C.00000000.297385774.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000C.00000000.297385774.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000F.00000000.335575660.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000F.00000000.335575660.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000F.00000000.337167425.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000F.00000000.337167425.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000002.302046756.0000000003991000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000000.00000002.302046756.0000000003991000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: CV.exe PID: 2060, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: CV.exe PID: 2060, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: CV.exe PID: 1464, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: CV.exe PID: 1464, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: dhcpmon.exe PID: 1096, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: dhcpmon.exe PID: 1096, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: dhcpmon.exe PID: 5368, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: dhcpmon.exe PID: 5368, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: CV.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: 0.2.CV.exe.3a064a0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.CV.exe.3a064a0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.CV.exe.3a064a0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 15.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 15.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 15.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0.2.CV.exe.3a38ec0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.CV.exe.3a38ec0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.CV.exe.3a38ec0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 15.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 15.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 15.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 15.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 15.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 15.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 14.2.dhcpmon.exe.41a8ec0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 14.2.dhcpmon.exe.41a8ec0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.dhcpmon.exe.41a8ec0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 15.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 15.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 15.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 15.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 15.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 15.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 15.2.dhcpmon.exe.45195fe.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 15.2.dhcpmon.exe.45195fe.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 15.2.dhcpmon.exe.45195fe.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 12.0.CV.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 12.0.CV.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.0.CV.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 15.2.dhcpmon.exe.451e434.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 15.2.dhcpmon.exe.451e434.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 15.2.dhcpmon.exe.4522a5d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 15.2.dhcpmon.exe.4522a5d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 15.2.dhcpmon.exe.451e434.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 15.2.dhcpmon.exe.451e434.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.0.CV.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 12.0.CV.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.0.CV.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 12.0.CV.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 12.0.CV.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.0.CV.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 15.2.dhcpmon.exe.34f3ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 15.2.dhcpmon.exe.34f3ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 15.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 15.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 15.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 12.0.CV.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 12.0.CV.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.0.CV.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 12.0.CV.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 12.0.CV.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.0.CV.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 14.2.dhcpmon.exe.41764a0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 14.2.dhcpmon.exe.41764a0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.dhcpmon.exe.41764a0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0.2.CV.exe.3a38ec0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.CV.exe.3a38ec0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 14.2.dhcpmon.exe.41764a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 14.2.dhcpmon.exe.41764a0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 14.2.dhcpmon.exe.41a8ec0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 14.2.dhcpmon.exe.41a8ec0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0.2.CV.exe.3a064a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.CV.exe.3a064a0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000F.00000002.355813819.00000000034D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000C.00000000.297944815.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0000000C.00000000.297944815.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000C.00000000.298501077.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0000000C.00000000.298501077.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000F.00000000.335021973.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0000000F.00000000.335021973.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000F.00000002.355853296.00000000044D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000F.00000002.352520108.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0000000F.00000002.352520108.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000E.00000002.340507265.0000000004101000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0000000E.00000002.340507265.0000000004101000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000C.00000000.299111610.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0000000C.00000000.299111610.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000F.00000000.336503359.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0000000F.00000000.336503359.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000C.00000000.297385774.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0000000C.00000000.297385774.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000F.00000000.335575660.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0000000F.00000000.335575660.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000F.00000000.337167425.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0000000F.00000000.337167425.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000002.302046756.0000000003991000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000000.00000002.302046756.0000000003991000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: CV.exe PID: 2060, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: CV.exe PID: 2060, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: CV.exe PID: 1464, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: CV.exe PID: 1464, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: dhcpmon.exe PID: 1096, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: dhcpmon.exe PID: 1096, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: dhcpmon.exe PID: 5368, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: dhcpmon.exe PID: 5368, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_04B30148
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_04B32C80
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_04B32C7D
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_04B30138
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_002E2D5E
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_002E2051
            Source: C:\Users\user\Desktop\CV.exeCode function: 11_2_003B2D5E
            Source: C:\Users\user\Desktop\CV.exeCode function: 11_2_003B2051
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_02D60148
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_02D62C80
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_02D62C6F
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_02D60138
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_00962051
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_00962D5E
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_056B3850
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_056B2FA8
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_056B23A0
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_056B306F
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_00E72051
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_00E72D5E
            Source: CV.exeBinary or memory string: OriginalFilename vs CV.exe
            Source: CV.exe, 00000000.00000002.303719593.0000000006C20000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dll@ vs CV.exe
            Source: CV.exe, 00000000.00000002.301343560.0000000002991000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameTransactionalFileManager.dllf# vs CV.exe
            Source: CV.exe, 00000000.00000000.278406444.00000000002E2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameContractArgumentValidatorAttribu.exe: vs CV.exe
            Source: CV.exe, 00000000.00000002.303239812.0000000006A90000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameTransactionalFileManager.dllf# vs CV.exe
            Source: CV.exe, 00000000.00000002.302046756.0000000003991000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dll@ vs CV.exe
            Source: CV.exe, 00000000.00000002.300907351.0000000000A8A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs CV.exe
            Source: CV.exeBinary or memory string: OriginalFilename vs CV.exe
            Source: CV.exe, 0000000B.00000002.295106319.00000000003B2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameContractArgumentValidatorAttribu.exe: vs CV.exe
            Source: CV.exe, 0000000C.00000000.295629964.0000000000742000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameContractArgumentValidatorAttribu.exe: vs CV.exe
            Source: CV.exeBinary or memory string: OriginalFilenameContractArgumentValidatorAttribu.exe: vs CV.exe
            Source: CV.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: CV.exeReversingLabs: Detection: 17%
            Source: C:\Users\user\Desktop\CV.exeFile read: C:\Users\user\Desktop\CV.exeJump to behavior
            Source: CV.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\CV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\CV.exe "C:\Users\user\Desktop\CV.exe"
            Source: C:\Users\user\Desktop\CV.exeProcess created: C:\Users\user\Desktop\CV.exe C:\Users\user\Desktop\CV.exe
            Source: C:\Users\user\Desktop\CV.exeProcess created: C:\Users\user\Desktop\CV.exe C:\Users\user\Desktop\CV.exe
            Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
            Source: C:\Users\user\Desktop\CV.exeProcess created: C:\Users\user\Desktop\CV.exe C:\Users\user\Desktop\CV.exe
            Source: C:\Users\user\Desktop\CV.exeProcess created: C:\Users\user\Desktop\CV.exe C:\Users\user\Desktop\CV.exe
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
            Source: C:\Users\user\Desktop\CV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_06A503F2 AdjustTokenPrivileges,
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_06A503BB AdjustTokenPrivileges,
            Source: C:\Users\user\Desktop\CV.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\CV.exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winEXE@8/8@20/1
            Source: C:\Users\user\Desktop\CV.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\CV.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Users\user\Desktop\CV.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Users\user\Desktop\CV.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\CV.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Users\user\Desktop\CV.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\CV.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{f4157c11-54e5-4893-8a60-6856b8471d8c}
            Source: C:\Users\user\Desktop\CV.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Users\user\Desktop\CV.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
            Source: C:\Users\user\Desktop\CV.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
            Source: C:\Users\user\Desktop\CV.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: CV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: CV.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: CV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: \??\C:\Windows\dll\System.pdb source: CV.exe, 0000000C.00000003.318588315.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.323644556.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.322436828.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.326790180.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.313126991.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.330640079.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.328492134.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.327958304.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.327672416.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.312101298.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.319051125.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.329401851.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.310808418.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.318016742.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.320861167.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.321371126.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.330345305.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.329526189.0000000000E5C000.00000004.00000001.sdmp
            Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdbf source: CV.exe, 0000000C.00000003.318588315.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.313126991.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.312101298.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.310808418.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.318016742.0000000000E5C000.00000004.00000001.sdmp
            Source: Binary string: ll\System.pdb source: CV.exe, 0000000C.00000003.349922547.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.341098572.0000000000E5C000.00000004.00000001.sdmp
            Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: CV.exe, 0000000C.00000003.318588315.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.313126991.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.312101298.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.310808418.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.318016742.0000000000E5C000.00000004.00000001.sdmp

            Data Obfuscation:

            barindex
            .NET source code contains potential unpackerShow sources
            Source: 0.2.CV.exe.2e0000.0.unpack, Hangman_Game/WelcomePage.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.CV.exe.2e0000.0.unpack, Hangman_Game/WelcomePage.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 11.2.CV.exe.3b0000.0.unpack, Hangman_Game/WelcomePage.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_00C82989 push edi; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_00C82D05 push eax; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_00C82B51 push eax; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_00C82E95 push edi; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_00C82EA1 push edi; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_00C82A3C push ecx; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_00C82CB0 push eax; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_00C829F5 push edi; ret
            Source: CV.exeStatic PE information: 0xD79B7A1C [Wed Aug 16 18:59:40 2084 UTC]
            Source: initial sampleStatic PE information: section name: .text entropy: 7.81416898043
            Source: C:\Users\user\Desktop\CV.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
            Source: C:\Users\user\Desktop\CV.exeFile opened: C:\Users\user\Desktop\CV.exe:Zone.Identifier read attributes | delete
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM3Show sources
            Source: Yara matchFile source: 14.2.dhcpmon.exe.3107a18.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.29979d8.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.301343560.0000000002991000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.339696473.0000000003101000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.301367377.00000000029AE000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.339762947.000000000311E000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CV.exe PID: 2060, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1096, type: MEMORYSTR
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: CV.exe, 00000000.00000002.301343560.0000000002991000.00000004.00000001.sdmp, CV.exe, 00000000.00000002.301367377.00000000029AE000.00000004.00000001.sdmp, dhcpmon.exe, 0000000E.00000002.339696473.0000000003101000.00000004.00000001.sdmp, dhcpmon.exe, 0000000E.00000002.339762947.000000000311E000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Source: CV.exe, 00000000.00000002.301343560.0000000002991000.00000004.00000001.sdmp, CV.exe, 00000000.00000002.301367377.00000000029AE000.00000004.00000001.sdmp, dhcpmon.exe, 0000000E.00000002.339696473.0000000003101000.00000004.00000001.sdmp, dhcpmon.exe, 0000000E.00000002.339762947.000000000311E000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Source: C:\Users\user\Desktop\CV.exe TID: 6212Thread sleep time: -35649s >= -30000s
            Source: C:\Users\user\Desktop\CV.exe TID: 6984Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\CV.exe TID: 1880Thread sleep time: -1844674407370954s >= -30000s
            Source: C:\Users\user\Desktop\CV.exe TID: 1880Thread sleep count: 190 > 30
            Source: C:\Users\user\Desktop\CV.exe TID: 1880Thread sleep count: 290 > 30
            Source: C:\Users\user\Desktop\CV.exe TID: 3104Thread sleep count: 37 > 30
            Source: C:\Users\user\Desktop\CV.exe TID: 1880Thread sleep count: 42 > 30
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5332Thread sleep time: -32135s >= -30000s
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3200Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4708Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_00C99E71 str word ptr [edi]
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_00C95BC7 rdtsc
            Source: C:\Users\user\Desktop\CV.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\CV.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\CV.exeWindow / User API: foregroundWindowGot 679
            Source: C:\Users\user\Desktop\CV.exeWindow / User API: foregroundWindowGot 611
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_00C99E71 sldt word ptr [ecx]
            Source: C:\Users\user\Desktop\CV.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\CV.exeThread delayed: delay time: 35649
            Source: C:\Users\user\Desktop\CV.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\CV.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 32135
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: dhcpmon.exe, 0000000E.00000002.339762947.000000000311E000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
            Source: dhcpmon.exe, 0000000E.00000002.339762947.000000000311E000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: dhcpmon.exe, 0000000E.00000002.339762947.000000000311E000.00000004.00000001.sdmpBinary or memory string: vmware
            Source: CV.exe, 0000000C.00000003.307201954.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.307651281.0000000000E5C000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW9S
            Source: CV.exe, 0000000C.00000003.318588315.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.356104173.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.349922547.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.323644556.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.307201954.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.322436828.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.326790180.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.313126991.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.330640079.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.328492134.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.341098572.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.327958304.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.356724987.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.327672416.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.312101298.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.355951467.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.357016554.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.319051125.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.367762618.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.329401851.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.378399039.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.310808418.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.307651281.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.308600797.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.318016742.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.356690824.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.320861167.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.321371126.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.355991301.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.366406608.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.367589440.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.330345305.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.329526189.0000000000E5C000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll9S
            Source: dhcpmon.exe, 0000000E.00000002.339762947.000000000311E000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_00C95BC7 rdtsc
            Source: C:\Users\user\Desktop\CV.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\CV.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\CV.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Injects a PE file into a foreign processesShow sources
            Source: C:\Users\user\Desktop\CV.exeMemory written: C:\Users\user\Desktop\CV.exe base: 400000 value starts with: 4D5A
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\CV.exeProcess created: C:\Users\user\Desktop\CV.exe C:\Users\user\Desktop\CV.exe
            Source: C:\Users\user\Desktop\CV.exeProcess created: C:\Users\user\Desktop\CV.exe C:\Users\user\Desktop\CV.exe
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
            Source: CV.exe, 0000000C.00000003.323644556.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.397171610.0000000000E88000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.330640079.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.328492134.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.341098572.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.327672416.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.312101298.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.329401851.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.366406608.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.329526189.0000000000E5C000.00000004.00000001.sdmpBinary or memory string: Program Manager
            Source: CV.exe, 0000000C.00000003.349922547.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.307201954.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.341098572.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.356724987.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.312101298.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.367762618.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.310808418.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.308600797.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.356690824.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.366406608.0000000000E5C000.00000004.00000001.sdmp, CV.exe, 0000000C.00000003.367589440.0000000000E5C000.00000004.00000001.sdmpBinary or memory string: Program ManagerClientPlugin.resources/SurveillanceExClientPlugin.resources
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

            Stealing of Sensitive Information:

            barindex
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 0.2.CV.exe.3a064a0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.3a38ec0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41a8ec0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.45195fe.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.451e434.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.4522a5d.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.451e434.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.10.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.12.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41764a0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.3a38ec0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41764a0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41a8ec0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.3a064a0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000F.00000002.355813819.00000000034D1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.297944815.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.298501077.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.335021973.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.355853296.00000000044D1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.352520108.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.340507265.0000000004101000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.299111610.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.336503359.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.297385774.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.335575660.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.337167425.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.302046756.0000000003991000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CV.exe PID: 2060, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: CV.exe PID: 1464, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1096, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5368, type: MEMORYSTR

            Remote Access Functionality:

            barindex
            Detected Nanocore RatShow sources
            Source: CV.exe, 00000000.00000002.302046756.0000000003991000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: CV.exe, 0000000C.00000000.297944815.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 0000000E.00000002.340507265.0000000004101000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 0000000F.00000002.355813819.00000000034D1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 0000000F.00000002.355813819.00000000034D1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: dhcpmon.exe, 0000000F.00000000.335021973.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 0000000F.00000002.355853296.00000000044D1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 0000000F.00000002.355853296.00000000044D1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 0.2.CV.exe.3a064a0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.3a38ec0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41a8ec0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.45195fe.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.451e434.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.4522a5d.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dhcpmon.exe.451e434.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.10.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.CV.exe.400000.12.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41764a0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.3a38ec0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41764a0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.dhcpmon.exe.41a8ec0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.3a064a0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000F.00000002.355813819.00000000034D1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.297944815.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.298501077.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.335021973.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.355853296.00000000044D1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.352520108.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.340507265.0000000004101000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.299111610.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.336503359.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.297385774.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.335575660.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.337167425.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.302046756.0000000003991000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CV.exe PID: 2060, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: CV.exe PID: 1464, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1096, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5368, type: MEMORYSTR

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation1Path InterceptionAccess Token Manipulation1Masquerading2Input Capture21Security Software Discovery221Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion41Security Account ManagerVirtualization/Sandbox Evasion41SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection112LSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Timestomp1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            CV.exe18%ReversingLabsByteCode-MSIL.Trojan.Zilla
            CV.exe100%Joe Sandbox ML

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe18%ReversingLabsByteCode-MSIL.Trojan.Zilla

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            15.0.dhcpmon.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            15.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            15.0.dhcpmon.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            15.0.dhcpmon.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            15.0.dhcpmon.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            12.0.CV.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            12.0.CV.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            12.0.CV.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            15.0.dhcpmon.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            12.0.CV.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            12.0.CV.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

            Domains

            SourceDetectionScannerLabelLink
            dera31.ddns.net6%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.tiro.comfi-f0%Avira URL Cloudsafe
            http://www.monotype.H0%Avira URL Cloudsafe
            http://www.carterandcone.comq0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/J0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/jp/s0%Avira URL Cloudsafe
            http://www.carterandcone.comtud0%Avira URL Cloudsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.carterandcone.com0%URL Reputationsafe
            dera31.ddns.net0%Avira URL Cloudsafe
            http://www.fontbureau.coma0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.fontbureau.comB.TTF0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/Vers0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.fontbureau.comrsiva0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.fontbureau.commm0%Avira URL Cloudsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.tiro.com(0%Avira URL Cloudsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.chinhdo.com0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            195.133.18.2110%Avira URL Cloudsafe
            http://en.wikipK0%Avira URL Cloudsafe
            http://www.goodfont.co.krf0%Avira URL Cloudsafe
            http://www.founder.com.cn/cnsq0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/Vet0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            dera31.ddns.net
            194.85.248.250
            truetrueunknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            dera31.ddns.nettrue
            • Avira URL Cloud: safe
            unknown
            195.133.18.211true
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.apache.org/licenses/LICENSE-2.0CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
              high
              http://www.fontbureau.comCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designersGCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                  high
                  http://www.fontbureau.com/designers/?CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bTheCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                      high
                      http://www.tiro.comfi-fCV.exe, 00000000.00000003.280984150.0000000004D32000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.monotype.HCV.exe, 00000000.00000003.288732810.0000000004D4A000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.carterandcone.comqCV.exe, 00000000.00000003.282219078.0000000004D41000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.284003844.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282035992.0000000004D3D000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283348759.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283860983.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282292551.0000000004D3F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283939050.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283265187.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282009352.0000000004D36000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282194332.0000000004D3E000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282482449.0000000004D3F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283180652.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283430595.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282900611.0000000004D40000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/JCV.exe, 00000000.00000003.282537391.0000000000DAB000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.tiro.comCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.281296877.0000000004D6D000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.286008984.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.291280536.0000000004D3B000.00000004.00000001.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/jp/sCV.exe, 00000000.00000003.282537391.0000000000DAB000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.carterandcone.comtudCV.exe, 00000000.00000003.282035992.0000000004D3D000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282009352.0000000004D36000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.goodfont.co.krCV.exe, 00000000.00000003.280424188.0000000004D34000.00000004.00000001.sdmp, CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comCV.exe, 00000000.00000003.282219078.0000000004D41000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282035992.0000000004D3D000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282292551.0000000004D3F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283265187.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282009352.0000000004D36000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282194332.0000000004D3E000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282482449.0000000004D3F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283180652.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282900611.0000000004D40000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comaCV.exe, 00000000.00000002.301271513.0000000000DA7000.00000004.00000040.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comlCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cTheCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnCV.exe, 00000000.00000003.280984150.0000000004D32000.00000004.00000001.sdmp, CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.280622676.0000000004D6D000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.281055683.0000000004D3F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.280672982.0000000004D6D000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlCV.exe, 00000000.00000003.286003858.0000000004D3E000.00000004.00000001.sdmp, CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                            high
                            http://www.fontbureau.comB.TTFCV.exe, 00000000.00000002.301271513.0000000000DA7000.00000004.00000040.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/VersCV.exe, 00000000.00000003.282537391.0000000000DAB000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/CV.exe, 00000000.00000003.282537391.0000000000DAB000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designerscCV.exe, 00000000.00000003.291280536.0000000004D3B000.00000004.00000001.sdmpfalse
                              high
                              http://www.fontbureau.comrsivaCV.exe, 00000000.00000002.301271513.0000000000DA7000.00000004.00000040.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/DPleaseCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers8CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                                high
                                http://www.fontbureau.commmCV.exe, 00000000.00000002.301271513.0000000000DA7000.00000004.00000040.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fonts.comCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.sandoll.co.krCV.exe, 00000000.00000003.280424188.0000000004D34000.00000004.00000001.sdmp, CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.deDPleaseCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers:CV.exe, 00000000.00000003.286008984.0000000004D40000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.tiro.com(CV.exe, 00000000.00000003.281731971.0000000004D6E000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.281205165.0000000004D6E000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.281296877.0000000004D6D000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    low
                                    http://www.zhongyicts.com.cnCV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.chinhdo.comdhcpmon.exe, 0000000E.00000002.339696473.0000000003101000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sakkal.comCV.exe, 00000000.00000003.283348759.0000000004D40000.00000004.00000001.sdmp, CV.exe, 00000000.00000002.302765938.0000000005FC2000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.283430595.0000000004D40000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://en.wikipKCV.exe, 00000000.00000003.282219078.0000000004D41000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282035992.0000000004D3D000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282292551.0000000004D3F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282009352.0000000004D36000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282194332.0000000004D3E000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.282482449.0000000004D3F000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.goodfont.co.krfCV.exe, 00000000.00000003.280424188.0000000004D34000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.founder.com.cn/cnsqCV.exe, 00000000.00000003.280585140.0000000004D32000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/VetCV.exe, 00000000.00000003.282537391.0000000000DAB000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown

                                    Contacted IPs

                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs

                                    Public

                                    IPDomainCountryFlagASNASN NameMalicious
                                    194.85.248.250
                                    dera31.ddns.netRussian Federation
                                    35478DATACENTERROtrue

                                    General Information

                                    Joe Sandbox Version:34.0.0 Boulder Opal
                                    Analysis ID:527831
                                    Start date:24.11.2021
                                    Start time:13:52:12
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 11m 33s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:CV.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:31
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@8/8@20/1
                                    EGA Information:Failed
                                    HDC Information:
                                    • Successful, ratio: 3.4% (good quality ratio 2.7%)
                                    • Quality average: 61.8%
                                    • Quality standard deviation: 32.9%
                                    HCA Information:
                                    • Successful, ratio: 85%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Found application associated with file extension: .exe
                                    Warnings:
                                    Show All
                                    • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                    • TCP Packets have been reduced to 100
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                    • Excluded IPs from analysis (whitelisted): 23.35.237.194, 23.211.6.115
                                    • Excluded domains from analysis (whitelisted): storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, storeedgefd.dsx.mp.microsoft.com.edgekey.net, arc.msn.com, storeedgefd.xbetservices.akadns.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, displaycatalog.mp.microsoft.com, e16646.dscg.akamaiedge.net, img-prod-cms-rt-microsoft-com.akamaized.net, storeedgefd.dsx.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.

                                    Simulations

                                    Behavior and APIs

                                    TimeTypeDescription
                                    13:53:09API Interceptor896x Sleep call for process: CV.exe modified
                                    13:53:18AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    13:53:27API Interceptor1x Sleep call for process: dhcpmon.exe modified

                                    Joe Sandbox View / Context

                                    IPs

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    194.85.248.250INV.exeGet hashmaliciousBrowse
                                      CV.exeGet hashmaliciousBrowse

                                        Domains

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        dera31.ddns.netINV.exeGet hashmaliciousBrowse
                                        • 194.85.248.250
                                        CV.exeGet hashmaliciousBrowse
                                        • 194.85.248.250
                                        circular_11_17_21.exeGet hashmaliciousBrowse
                                        • 195.133.18.211
                                        Bank Report.exeGet hashmaliciousBrowse
                                        • 195.133.18.211
                                        cliff.kuhfeldt's CV.exeGet hashmaliciousBrowse
                                        • 195.133.18.211
                                        Jessica Ohnesorge'CV.exeGet hashmaliciousBrowse
                                        • 195.133.18.211
                                        Change Of Registration Form.exeGet hashmaliciousBrowse
                                        • 195.133.18.211
                                        Payment invoice.exeGet hashmaliciousBrowse
                                        • 195.133.18.211
                                        Wire Transfer Slip.exeGet hashmaliciousBrowse
                                        • 195.133.18.211
                                        Advise.exeGet hashmaliciousBrowse
                                        • 195.133.18.211
                                        Bank Report.exeGet hashmaliciousBrowse
                                        • 195.133.18.211
                                        N5HlpHINh2.exeGet hashmaliciousBrowse
                                        • 195.133.18.211
                                        BL draft.exeGet hashmaliciousBrowse
                                        • 195.133.18.211

                                        ASN

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        DATACENTERROINV.exeGet hashmaliciousBrowse
                                        • 194.85.248.250
                                        CV.exeGet hashmaliciousBrowse
                                        • 194.85.248.250
                                        TMR590241368.exeGet hashmaliciousBrowse
                                        • 194.85.248.115
                                        vIyyHkRXJnGet hashmaliciousBrowse
                                        • 194.85.250.154
                                        267A80yAhpGet hashmaliciousBrowse
                                        • 194.85.250.154
                                        QJYxAALd23Get hashmaliciousBrowse
                                        • 194.85.250.154
                                        z4bJfjXDDQGet hashmaliciousBrowse
                                        • 194.85.250.154
                                        XXaLHoecGpGet hashmaliciousBrowse
                                        • 194.85.250.154
                                        AGiCic4uDzGet hashmaliciousBrowse
                                        • 194.85.250.154
                                        3B3BMxYG8nGet hashmaliciousBrowse
                                        • 194.85.250.154
                                        6WMo1OYmk3Get hashmaliciousBrowse
                                        • 194.85.250.154
                                        dycuTng5W8Get hashmaliciousBrowse
                                        • 194.85.250.154
                                        xINX4f5M8sGet hashmaliciousBrowse
                                        • 194.85.250.154
                                        SSIuSyaBAFGet hashmaliciousBrowse
                                        • 194.85.250.154
                                        IMG600094173852.exeGet hashmaliciousBrowse
                                        • 194.85.248.115
                                        cdQc14SeRuGet hashmaliciousBrowse
                                        • 194.85.248.128
                                        t5dIUw7hghGet hashmaliciousBrowse
                                        • 194.85.248.128
                                        9hYMlirC3xGet hashmaliciousBrowse
                                        • 194.85.248.128
                                        qd7I0rgtfUGet hashmaliciousBrowse
                                        • 194.85.248.128
                                        aKU4GDKdTZGet hashmaliciousBrowse
                                        • 194.85.248.128

                                        JA3 Fingerprints

                                        No context

                                        Dropped Files

                                        No context

                                        Created / dropped Files

                                        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Process:C:\Users\user\Desktop\CV.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):608256
                                        Entropy (8bit):7.801754700760465
                                        Encrypted:false
                                        SSDEEP:12288:ZNtD00tT0tvUHZMzxSC3rZc9/iz0YhmeBJv3ej9KUrx9jgrv:3C0tqUESOrZ5game3Oj9fdGr
                                        MD5:D1EDB7CD80F20347FA00F25792241EA5
                                        SHA1:63C1BFFD57BB0E4CC32C53ECCCE4916FEA2AF18D
                                        SHA-256:B186F6738901B0CF5824A3E3789AF05342F414F30AD10D615A2B1A4203280627
                                        SHA-512:23A4AB61160F9C63E7FA1BCA39FBF7683297DF43CECBCEBE0A4990B7FD8135D249BF4AC8A13187A2AA04066B188F61F86614684B7A24DB87FF8EDB9992AF4714
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 18%
                                        Reputation:low
                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....z................0..<...........[... ...`....@.. ....................................@.................................T[..O....`..............................8[............................................... ............... ..H............text....;... ...<.................. ..`.rsrc........`.......>..............@..@.reloc...............F..............@..B.................[......H...........L......y...h................................................r...p}.....r...p(....}......}.....(.......(.....*..0..f.........{....o....o......r...p(....}......+...{....o.....{......o....&...X...{.....i....-..{....r!..po.....*...0............{....o....(......,..r#..p(....&..+[..{....o.......+=..o.........(........,!.rU..p(....&.{....r!..po.......+....X...o....2...+..*...0.............r...p(....}.....{....( .....{......s!.....o"......+U..{.......{....o#....o$...o%.
                                        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                        Process:C:\Users\user\Desktop\CV.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview: [ZoneTransfer]....ZoneId=0
                                        C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\CV.exe.log
                                        Process:C:\Users\user\Desktop\CV.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):525
                                        Entropy (8bit):5.2874233355119316
                                        Encrypted:false
                                        SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                        MD5:61CCF53571C9ABA6511D696CB0D32E45
                                        SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                        SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                        SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                        C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                        Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):525
                                        Entropy (8bit):5.2874233355119316
                                        Encrypted:false
                                        SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                        MD5:61CCF53571C9ABA6511D696CB0D32E45
                                        SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                        SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                        SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                        Process:C:\Users\user\Desktop\CV.exe
                                        File Type:data
                                        Category:modified
                                        Size (bytes):232
                                        Entropy (8bit):7.117516745217376
                                        Encrypted:false
                                        SSDEEP:6:X4LDAnybgCFcpJSQwP4d7V9Nhyleajl0fuONKcpMe5i:X4LEnybgCFCtvd7V9NYRj+GONKaMv
                                        MD5:CF55DF705B79F961ED069D8E84D2AF1C
                                        SHA1:574CDF36753CF356A25872BCCAA3CC6FFCD5D23F
                                        SHA-256:DF982E10764D21FCB1469EB6EA1175AC69544C68900B0DD8C79A0FE8A8F300F5
                                        SHA-512:518A037DF1D6FBC8A296DA5B96B67E073FB1F674090AFE3243E52A65B169DE35FC041C2C05F7EEF9EC74A0100A422E53B3D7D920E5ADF6CE42B82FE94244F5DE
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL...Q.F...@.h.......y.[....e..<..n....B...PP...azZ).~..Uj.>..H.b.O..AX.E.S&.O.k.3O'.Lge...$..teI....Hw.CT.].Z.
                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                        Process:C:\Users\user\Desktop\CV.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):8
                                        Entropy (8bit):3.0
                                        Encrypted:false
                                        SSDEEP:3:RTt:ht
                                        MD5:4495EBD38CC409948B11222A87339B62
                                        SHA1:7586E6C3CAD711FC3837B4064C14B741124C44B6
                                        SHA-256:8BF390A9F9ADBB0972125302C00F3328117DA280DDE757EEF3D01D215BE04369
                                        SHA-512:478925A733767D391B80A975021FB50DA33B235B2341CFDB39AC3F81D5F022AA6C014DB79936EDE918BEA040AF94F96739309690CAAE3BC086F7933EF044D5F8
                                        Malicious:true
                                        Reputation:low
                                        Preview: .Ww...H
                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                        Process:C:\Users\user\Desktop\CV.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):40
                                        Entropy (8bit):5.153055907333276
                                        Encrypted:false
                                        SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                        MD5:4E5E92E2369688041CC82EF9650EDED2
                                        SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                        SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                        SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                        Malicious:false
                                        Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                        Process:C:\Users\user\Desktop\CV.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):412824
                                        Entropy (8bit):7.999596596836973
                                        Encrypted:true
                                        SSDEEP:12288:8I9gnTsbHFPV7iGQVIB8XBLeMb2qLB1rRxH:8QbHFxB8gMiQRxH
                                        MD5:C9DF8F232494E30402189920360F0907
                                        SHA1:F181CE82F56D624408AFD68FE82A6A9D77A23383
                                        SHA-256:ADA0DF11313089119C94406A8EF300442BC1F42ACFA44DF840F5FA9C732026C3
                                        SHA-512:541579149843E1C08AEAA60DCC5C379D74D87BD7538B6E84D6476E79A65324BB023DFEE5E44F8BF1E794B94F83E5902FE84F4722CFEED37B1C426B97F4F43769
                                        Malicious:false
                                        Preview: FF)d6...0...{..X$.E.v>..'9}G>W.S.K.....(..">b/(..m...d....G1.Fwf..1jr..2.i.K}..,.W....;;..y..U.b.O...1.kb...u...4.]7...D.W..Ci..k.U..+...%..D.[.W..6/......j...w..4p...w...e...v..E...CV'.<....YN.....t2.....p.k..6..[...N.l...Dg..L....O>.H...^..8Kifc....%...yX....e.....y.-O...%.........m_..v..5.A.3.8...A.;.|.3p .yf('..Z.2Sv...Q.&.4...80.h....7u.a..~[....zr.V:cP:f..cy.f....F.b@........Hu.fs.....b...l.V..u...p.p.h.S..'...*?.........5.JMa......s,.<k.bo.V.)<.[R.-.......myP._Y.$...#dS....XN..IE..........Q..w.s`.....<.t.....`.T<.........C.........<..e........p&...F..{. ,nA..".m..$.HD`..:..g.....8...P@/PCxU8>{..............1|_fX......t.:.....X.\..<..._....7u...2.S2Rx...'../.4..0:P...i....DY..].......R....)..0F...M..w..f.....EV.T...v.r..D.K..Yuz \.K+..........y.`...<.!.C...R...C..s:)..=vL..$}6..1...?A(DJ........t..u..xg{.C$8..k.P0..f..D8..g.b..'es....pX..q..[..@32u..1.`.hy.B.*;.c......w.....o...Z.s.d.$.j..!%v..2....{..P...CP.l.X...}w.".\-

                                        Static File Info

                                        General

                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.801754700760465
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Windows Screen Saver (13104/52) 0.07%
                                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                        File name:CV.exe
                                        File size:608256
                                        MD5:d1edb7cd80f20347fa00f25792241ea5
                                        SHA1:63c1bffd57bb0e4cc32c53eccce4916fea2af18d
                                        SHA256:b186f6738901b0cf5824a3e3789af05342f414f30ad10d615a2b1a4203280627
                                        SHA512:23a4ab61160f9c63e7fa1bca39fbf7683297df43cecbcebe0a4990b7fd8135d249bf4ac8a13187a2aa04066b188f61f86614684b7a24db87ff8edb9992af4714
                                        SSDEEP:12288:ZNtD00tT0tvUHZMzxSC3rZc9/iz0YhmeBJv3ej9KUrx9jgrv:3C0tqUESOrZ5game3Oj9fdGr
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....z................0..<...........[... ...`....@.. ....................................@................................

                                        File Icon

                                        Icon Hash:00828e8e8686b000

                                        Static PE Info

                                        General

                                        Entrypoint:0x495ba6
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                        Time Stamp:0xD79B7A1C [Wed Aug 16 18:59:40 2084 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:v2.0.50727
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                        Entrypoint Preview

                                        Instruction
                                        jmp dword ptr [00402000h]
                                        aas
                                        add byte ptr [eax], al
                                        add byte ptr [esi], cl
                                        add byte ptr [eax], al
                                        add byte ptr [edx+08h], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al

                                        Data Directories

                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x95b540x4f.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x960000x61c.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x980000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x95b380x1c.text
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                        Sections

                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000x93bbc0x93c00False0.883513113367data7.81416898043IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                        .rsrc0x960000x61c0x800False0.32958984375data3.44757176979IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x980000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                        Resources

                                        NameRVASizeTypeLanguageCountry
                                        RT_VERSION0x960900x38cPGP symmetric key encrypted data - Plaintext or unencrypted data
                                        RT_MANIFEST0x9642c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                        Imports

                                        DLLImport
                                        mscoree.dll_CorExeMain

                                        Version Infos

                                        DescriptionData
                                        Translation0x0000 0x04b0
                                        LegalCopyrightCopyright 2021
                                        Assembly Version1.0.0.0
                                        InternalNameContractArgumentValidatorAttribu.exe
                                        FileVersion1.0.0.0
                                        CompanyName
                                        LegalTrademarks
                                        Comments
                                        ProductNameHangman_Game
                                        ProductVersion1.0.0.0
                                        FileDescriptionHangman_Game
                                        OriginalFilenameContractArgumentValidatorAttribu.exe

                                        Network Behavior

                                        Snort IDS Alerts

                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                        11/24/21-13:53:17.975419UDP254DNS SPOOF query response with TTL of 1 min. and no authority53495728.8.8.8192.168.2.3
                                        11/24/21-13:53:18.055737TCP2025019ET TROJAN Possible NanoCore C2 60B497781187192.168.2.3194.85.248.250
                                        11/24/21-13:53:23.356626UDP254DNS SPOOF query response with TTL of 1 min. and no authority53608238.8.8.8192.168.2.3
                                        11/24/21-13:53:23.388450TCP2025019ET TROJAN Possible NanoCore C2 60B497791187192.168.2.3194.85.248.250
                                        11/24/21-13:53:28.253885TCP2025019ET TROJAN Possible NanoCore C2 60B497801187192.168.2.3194.85.248.250
                                        11/24/21-13:53:32.911509UDP254DNS SPOOF query response with TTL of 1 min. and no authority53551028.8.8.8192.168.2.3
                                        11/24/21-13:53:32.943821TCP2025019ET TROJAN Possible NanoCore C2 60B497811187192.168.2.3194.85.248.250
                                        11/24/21-13:53:37.735223TCP2025019ET TROJAN Possible NanoCore C2 60B497841187192.168.2.3194.85.248.250
                                        11/24/21-13:53:45.423244TCP2025019ET TROJAN Possible NanoCore C2 60B497851187192.168.2.3194.85.248.250
                                        11/24/21-13:53:50.000725TCP2025019ET TROJAN Possible NanoCore C2 60B497861187192.168.2.3194.85.248.250
                                        11/24/21-13:53:58.498083TCP2025019ET TROJAN Possible NanoCore C2 60B497881187192.168.2.3194.85.248.250
                                        11/24/21-13:54:04.826647TCP2025019ET TROJAN Possible NanoCore C2 60B497891187192.168.2.3194.85.248.250
                                        11/24/21-13:54:09.406079UDP254DNS SPOOF query response with TTL of 1 min. and no authority53643678.8.8.8192.168.2.3
                                        11/24/21-13:54:09.438255TCP2025019ET TROJAN Possible NanoCore C2 60B498061187192.168.2.3194.85.248.250
                                        11/24/21-13:54:15.518024UDP254DNS SPOOF query response with TTL of 1 min. and no authority53553938.8.8.8192.168.2.3
                                        11/24/21-13:54:15.684471TCP2025019ET TROJAN Possible NanoCore C2 60B498251187192.168.2.3194.85.248.250
                                        11/24/21-13:54:22.080250UDP254DNS SPOOF query response with TTL of 1 min. and no authority53634568.8.8.8192.168.2.3
                                        11/24/21-13:54:22.124316TCP2025019ET TROJAN Possible NanoCore C2 60B498311187192.168.2.3194.85.248.250
                                        11/24/21-13:54:28.169710UDP254DNS SPOOF query response with TTL of 1 min. and no authority53585408.8.8.8192.168.2.3
                                        11/24/21-13:54:28.198987TCP2025019ET TROJAN Possible NanoCore C2 60B498331187192.168.2.3194.85.248.250
                                        11/24/21-13:54:34.155830UDP254DNS SPOOF query response with TTL of 1 min. and no authority53551088.8.8.8192.168.2.3
                                        11/24/21-13:54:34.218813TCP2025019ET TROJAN Possible NanoCore C2 60B498421187192.168.2.3194.85.248.250
                                        11/24/21-13:54:41.244944TCP2025019ET TROJAN Possible NanoCore C2 60B498571187192.168.2.3194.85.248.250
                                        11/24/21-13:54:47.179558TCP2025019ET TROJAN Possible NanoCore C2 60B498581187192.168.2.3194.85.248.250
                                        11/24/21-13:54:54.239251TCP2025019ET TROJAN Possible NanoCore C2 60B498601187192.168.2.3194.85.248.250
                                        11/24/21-13:55:00.250467TCP2025019ET TROJAN Possible NanoCore C2 60B498611187192.168.2.3194.85.248.250
                                        11/24/21-13:55:06.162115TCP2025019ET TROJAN Possible NanoCore C2 60B498621187192.168.2.3194.85.248.250
                                        11/24/21-13:55:12.785801TCP2025019ET TROJAN Possible NanoCore C2 60B498631187192.168.2.3194.85.248.250

                                        Network Port Distribution

                                        TCP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        Nov 24, 2021 13:53:17.992723942 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:18.020802021 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.021049023 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:18.055737019 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:18.211479902 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.211589098 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:18.323577881 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.323761940 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:18.355977058 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.372076988 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:18.527064085 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.527159929 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:18.597246885 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.653857946 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:18.684132099 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:18.822926044 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.823030949 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:18.923531055 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.926470041 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:18.960771084 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.960820913 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.960870028 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.960918903 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.961078882 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:18.988863945 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.988917112 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.988955021 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.988990068 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.989028931 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.989039898 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:18.989068031 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.989105940 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.989142895 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:18.989193916 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:18.989245892 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:18.999725103 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:19.017121077 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017168999 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017210007 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017249107 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017266035 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:19.017287016 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:19.017287970 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017302990 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:19.017328978 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017365932 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017384052 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:19.017405033 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017442942 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017457008 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:19.017481089 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017493010 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:19.017520905 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017558098 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017571926 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:19.017599106 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017637014 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017652988 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:19.017677069 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017715931 CET118749778194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:19.017729044 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:19.017765045 CET497781187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:23.359519005 CET497791187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:23.387202024 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.387399912 CET497791187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:23.388449907 CET497791187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:23.431622028 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.431853056 CET497791187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:23.459992886 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.460129976 CET497791187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:23.487601042 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.529215097 CET497791187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:23.529470921 CET497791187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:23.679559946 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.679855108 CET497791187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:23.778896093 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.780015945 CET497791187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:23.839884043 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.839936972 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.839973927 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.840012074 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.840013981 CET497791187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:23.840068102 CET497791187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:23.842621088 CET497791187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:23.867552996 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.867582083 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.867594004 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.867607117 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.867624998 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.867636919 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.867647886 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.867660999 CET118749779194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:23.867695093 CET497791187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:23.867741108 CET497791187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:23.867748022 CET497791187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:28.225517035 CET497801187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:28.253149986 CET118749780194.85.248.250192.168.2.3
                                        Nov 24, 2021 13:53:28.253305912 CET497801187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:28.253885031 CET497801187192.168.2.3194.85.248.250
                                        Nov 24, 2021 13:53:28.321084023 CET118749780194.85.248.250192.168.2.3

                                        UDP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        Nov 24, 2021 13:53:17.945394039 CET4957253192.168.2.38.8.8.8
                                        Nov 24, 2021 13:53:17.975419044 CET53495728.8.8.8192.168.2.3
                                        Nov 24, 2021 13:53:23.335347891 CET6082353192.168.2.38.8.8.8
                                        Nov 24, 2021 13:53:23.356626034 CET53608238.8.8.8192.168.2.3
                                        Nov 24, 2021 13:53:28.203588009 CET5213053192.168.2.38.8.8.8
                                        Nov 24, 2021 13:53:28.221946955 CET53521308.8.8.8192.168.2.3
                                        Nov 24, 2021 13:53:32.891006947 CET5510253192.168.2.38.8.8.8
                                        Nov 24, 2021 13:53:32.911509037 CET53551028.8.8.8192.168.2.3
                                        Nov 24, 2021 13:53:37.682377100 CET5652753192.168.2.38.8.8.8
                                        Nov 24, 2021 13:53:37.703850031 CET53565278.8.8.8192.168.2.3
                                        Nov 24, 2021 13:53:45.372145891 CET4955953192.168.2.38.8.8.8
                                        Nov 24, 2021 13:53:45.392890930 CET53495598.8.8.8192.168.2.3
                                        Nov 24, 2021 13:53:49.949804068 CET5265053192.168.2.38.8.8.8
                                        Nov 24, 2021 13:53:49.969712019 CET53526508.8.8.8192.168.2.3
                                        Nov 24, 2021 13:53:57.280015945 CET5836153192.168.2.38.8.8.8
                                        Nov 24, 2021 13:53:57.299962044 CET53583618.8.8.8192.168.2.3
                                        Nov 24, 2021 13:54:04.746898890 CET5361553192.168.2.38.8.8.8
                                        Nov 24, 2021 13:54:04.766309023 CET53536158.8.8.8192.168.2.3
                                        Nov 24, 2021 13:54:09.384938955 CET6436753192.168.2.38.8.8.8
                                        Nov 24, 2021 13:54:09.406079054 CET53643678.8.8.8192.168.2.3
                                        Nov 24, 2021 13:54:15.495414019 CET5539353192.168.2.38.8.8.8
                                        Nov 24, 2021 13:54:15.518023968 CET53553938.8.8.8192.168.2.3
                                        Nov 24, 2021 13:54:22.059016943 CET6345653192.168.2.38.8.8.8
                                        Nov 24, 2021 13:54:22.080250025 CET53634568.8.8.8192.168.2.3
                                        Nov 24, 2021 13:54:28.145822048 CET5854053192.168.2.38.8.8.8
                                        Nov 24, 2021 13:54:28.169709921 CET53585408.8.8.8192.168.2.3
                                        Nov 24, 2021 13:54:34.134350061 CET5510853192.168.2.38.8.8.8
                                        Nov 24, 2021 13:54:34.155829906 CET53551088.8.8.8192.168.2.3
                                        Nov 24, 2021 13:54:41.195228100 CET5894253192.168.2.38.8.8.8
                                        Nov 24, 2021 13:54:41.215020895 CET53589428.8.8.8192.168.2.3
                                        Nov 24, 2021 13:54:47.129384041 CET6443253192.168.2.38.8.8.8
                                        Nov 24, 2021 13:54:47.149298906 CET53644328.8.8.8192.168.2.3
                                        Nov 24, 2021 13:54:54.160470963 CET6349053192.168.2.38.8.8.8
                                        Nov 24, 2021 13:54:54.178567886 CET53634908.8.8.8192.168.2.3
                                        Nov 24, 2021 13:55:00.192150116 CET6511053192.168.2.38.8.8.8
                                        Nov 24, 2021 13:55:00.212667942 CET53651108.8.8.8192.168.2.3
                                        Nov 24, 2021 13:55:06.110857964 CET6112053192.168.2.38.8.8.8
                                        Nov 24, 2021 13:55:06.130167961 CET53611208.8.8.8192.168.2.3
                                        Nov 24, 2021 13:55:12.701934099 CET5307953192.168.2.38.8.8.8
                                        Nov 24, 2021 13:55:12.723361969 CET53530798.8.8.8192.168.2.3

                                        DNS Queries

                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                        Nov 24, 2021 13:53:17.945394039 CET192.168.2.38.8.8.80x36c2Standard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:53:23.335347891 CET192.168.2.38.8.8.80x3fbaStandard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:53:28.203588009 CET192.168.2.38.8.8.80x6d40Standard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:53:32.891006947 CET192.168.2.38.8.8.80xace7Standard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:53:37.682377100 CET192.168.2.38.8.8.80xcad5Standard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:53:45.372145891 CET192.168.2.38.8.8.80xbb0aStandard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:53:49.949804068 CET192.168.2.38.8.8.80x78f2Standard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:53:57.280015945 CET192.168.2.38.8.8.80x68a4Standard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:04.746898890 CET192.168.2.38.8.8.80xa2b6Standard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:09.384938955 CET192.168.2.38.8.8.80xf78dStandard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:15.495414019 CET192.168.2.38.8.8.80x4b23Standard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:22.059016943 CET192.168.2.38.8.8.80xd0aaStandard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:28.145822048 CET192.168.2.38.8.8.80x3c50Standard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:34.134350061 CET192.168.2.38.8.8.80xdc7aStandard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:41.195228100 CET192.168.2.38.8.8.80x13efStandard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:47.129384041 CET192.168.2.38.8.8.80x2da7Standard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:54.160470963 CET192.168.2.38.8.8.80x2883Standard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:55:00.192150116 CET192.168.2.38.8.8.80xa977Standard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:55:06.110857964 CET192.168.2.38.8.8.80x3defStandard query (0)dera31.ddns.netA (IP address)IN (0x0001)
                                        Nov 24, 2021 13:55:12.701934099 CET192.168.2.38.8.8.80xf76fStandard query (0)dera31.ddns.netA (IP address)IN (0x0001)

                                        DNS Answers

                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                        Nov 24, 2021 13:53:17.975419044 CET8.8.8.8192.168.2.30x36c2No error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:53:23.356626034 CET8.8.8.8192.168.2.30x3fbaNo error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:53:28.221946955 CET8.8.8.8192.168.2.30x6d40No error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:53:32.911509037 CET8.8.8.8192.168.2.30xace7No error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:53:37.703850031 CET8.8.8.8192.168.2.30xcad5No error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:53:45.392890930 CET8.8.8.8192.168.2.30xbb0aNo error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:53:49.969712019 CET8.8.8.8192.168.2.30x78f2No error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:53:57.299962044 CET8.8.8.8192.168.2.30x68a4No error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:04.766309023 CET8.8.8.8192.168.2.30xa2b6No error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:09.406079054 CET8.8.8.8192.168.2.30xf78dNo error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:15.518023968 CET8.8.8.8192.168.2.30x4b23No error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:22.080250025 CET8.8.8.8192.168.2.30xd0aaNo error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:28.169709921 CET8.8.8.8192.168.2.30x3c50No error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:34.155829906 CET8.8.8.8192.168.2.30xdc7aNo error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:41.215020895 CET8.8.8.8192.168.2.30x13efNo error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:47.149298906 CET8.8.8.8192.168.2.30x2da7No error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:54:54.178567886 CET8.8.8.8192.168.2.30x2883No error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:55:00.212667942 CET8.8.8.8192.168.2.30xa977No error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:55:06.130167961 CET8.8.8.8192.168.2.30x3defNo error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)
                                        Nov 24, 2021 13:55:12.723361969 CET8.8.8.8192.168.2.30xf76fNo error (0)dera31.ddns.net194.85.248.250A (IP address)IN (0x0001)

                                        Code Manipulations

                                        Statistics

                                        Behavior

                                        Click to jump to process

                                        System Behavior

                                        General

                                        Start time:13:53:02
                                        Start date:24/11/2021
                                        Path:C:\Users\user\Desktop\CV.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\CV.exe"
                                        Imagebase:0x2e0000
                                        File size:608256 bytes
                                        MD5 hash:D1EDB7CD80F20347FA00F25792241EA5
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.301343560.0000000002991000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.301367377.00000000029AE000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.302046756.0000000003991000.00000004.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.302046756.0000000003991000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.302046756.0000000003991000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        Reputation:low

                                        General

                                        Start time:13:53:09
                                        Start date:24/11/2021
                                        Path:C:\Users\user\Desktop\CV.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Users\user\Desktop\CV.exe
                                        Imagebase:0x3b0000
                                        File size:608256 bytes
                                        MD5 hash:D1EDB7CD80F20347FA00F25792241EA5
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low

                                        General

                                        Start time:13:53:10
                                        Start date:24/11/2021
                                        Path:C:\Users\user\Desktop\CV.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\CV.exe
                                        Imagebase:0x740000
                                        File size:608256 bytes
                                        MD5 hash:D1EDB7CD80F20347FA00F25792241EA5
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.297944815.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.297944815.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.297944815.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.298501077.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.298501077.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.298501077.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.299111610.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.299111610.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.299111610.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.297385774.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.297385774.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.297385774.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        Reputation:low

                                        General

                                        Start time:13:53:26
                                        Start date:24/11/2021
                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                        Imagebase:0x960000
                                        File size:608256 bytes
                                        MD5 hash:D1EDB7CD80F20347FA00F25792241EA5
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000E.00000002.339696473.0000000003101000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.340507265.0000000004101000.00000004.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.340507265.0000000004101000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.340507265.0000000004101000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000E.00000002.339762947.000000000311E000.00000004.00000001.sdmp, Author: Joe Security
                                        Antivirus matches:
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 18%, ReversingLabs
                                        Reputation:low

                                        General

                                        Start time:13:53:28
                                        Start date:24/11/2021
                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Imagebase:0xe70000
                                        File size:608256 bytes
                                        MD5 hash:D1EDB7CD80F20347FA00F25792241EA5
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.355813819.00000000034D1000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.355813819.00000000034D1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000000.335021973.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000000.335021973.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000F.00000000.335021973.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.355853296.00000000044D1000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.355853296.00000000044D1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.352520108.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.352520108.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.352520108.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000000.336503359.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000000.336503359.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000F.00000000.336503359.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000000.335575660.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000000.335575660.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000F.00000000.335575660.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000000.337167425.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000000.337167425.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000F.00000000.337167425.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        Reputation:low

                                        Disassembly

                                        Code Analysis

                                        Reset < >