Loading ...

Play interactive tourEdit tour

Windows Analysis Report INFORMATION CONFIRMATION LIST.exe

Overview

General Information

Sample Name:INFORMATION CONFIRMATION LIST.exe
Analysis ID:552379
MD5:6c6b35176645588b4b9a12b22b373acb
SHA1:4c6da16811cb1f8c4877c34e517a4839d0d118e8
SHA256:2a599c2395394c8a00d1689e9ca6c2481062ebb70c02c905562e68d7087b875c
Tags:exenanocore
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sigma detected: Suspicius Add Task From User AppData Temp
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • INFORMATION CONFIRMATION LIST.exe (PID: 5944 cmdline: "C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe" MD5: 6C6B35176645588B4B9A12B22B373ACB)
    • INFORMATION CONFIRMATION LIST.exe (PID: 5760 cmdline: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe MD5: 6C6B35176645588B4B9A12B22B373ACB)
      • schtasks.exe (PID: 4624 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp820C.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 4528 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp8CCB.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 1400 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: 6C6B35176645588B4B9A12B22B373ACB)
    • dhcpmon.exe (PID: 3000 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 6C6B35176645588B4B9A12B22B373ACB)
    • dhcpmon.exe (PID: 5344 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 6C6B35176645588B4B9A12B22B373ACB)
  • dhcpmon.exe (PID: 4404 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 6C6B35176645588B4B9A12B22B373ACB)
    • dhcpmon.exe (PID: 6208 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 6C6B35176645588B4B9A12B22B373ACB)
    • dhcpmon.exe (PID: 6280 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 6C6B35176645588B4B9A12B22B373ACB)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000018.00000000.302302805.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000018.00000000.302302805.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000018.00000000.302302805.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    0000001B.00000000.312722643.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0000001B.00000000.312722643.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 123 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      21.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      21.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      21.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        21.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfef5:$a: NanoCore
        • 0xff05:$a: NanoCore
        • 0x10139:$a: NanoCore
        • 0x1014d:$a: NanoCore
        • 0x1018d:$a: NanoCore
        • 0xff54:$b: ClientPlugin
        • 0x10156:$b: ClientPlugin
        • 0x10196:$b: ClientPlugin
        • 0x1007b:$c: ProjectData
        • 0x10a82:$d: DESCrypto
        • 0x1844e:$e: KeepAlive
        • 0x1643c:$g: LogClientMessage
        • 0x12637:$i: get_Connected
        • 0x10db8:$j: #=q
        • 0x10de8:$j: #=q
        • 0x10e04:$j: #=q
        • 0x10e34:$j: #=q
        • 0x10e50:$j: #=q
        • 0x10e6c:$j: #=q
        • 0x10e9c:$j: #=q
        • 0x10eb8:$j: #=q
        1.2.INFORMATION CONFIRMATION LIST.exe.3dbb78e.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0x145e3:$x1: NanoCore.ClientPluginHost
        • 0x2d5e7:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        • 0x14610:$x2: IClientNetworkHost
        • 0x2d614:$x2: IClientNetworkHost
        Click to see the 226 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe, ProcessId: 5760, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe, ProcessId: 5760, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        System Summary:

        barindex
        Sigma detected: Suspicius Add Task From User AppData TempShow sources
        Source: Process startedAuthor: frack113: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp820C.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp820C.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe, ParentImage: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe, ParentProcessId: 5760, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp820C.tmp, ProcessId: 4624

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe, ProcessId: 5760, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe, ProcessId: 5760, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Multi AV Scanner detection for submitted fileShow sources
        Source: INFORMATION CONFIRMATION LIST.exeVirustotal: Detection: 27%Perma Link
        Source: INFORMATION CONFIRMATION LIST.exeReversingLabs: Detection: 32%
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeVirustotal: Detection: 27%Perma Link
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 32%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dbb78e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.4124bed.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.411b78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.41205c4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.4094bed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.4064bed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc05c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3901728.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4011728.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.40605c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4044348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.405b78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.41205c4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.40605c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.40905c4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.408b78e.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.40905c4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.6164629.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3934348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc05c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc4bed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3934348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3901728.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4044348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4011728.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000018.00000000.302302805.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.312722643.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.261981801.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.526582144.0000000006160000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.259830236.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.512207738.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.295280234.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.309977599.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.342876940.00000000030D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.324466242.0000000004019000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.297703495.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.265183487.0000000004239000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.311061484.0000000003F99000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.333703399.0000000004049000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.316433634.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.518799524.0000000002D71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.341874563.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.260204856.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.324510699.0000000003889000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.342977338.00000000040D9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.332200661.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.310754452.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000000.306212068.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.295881871.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.333597444.0000000003041000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.523536861.0000000003DAA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.296607452.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.324314955.0000000003011000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.261090435.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000000.303465197.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.320716900.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000000.304879446.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.300771610.0000000003FC9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5944, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5760, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4532, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1400, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4404, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4860, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5344, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6280, type: MEMORYSTR
        Machine Learning detection for sampleShow sources
        Source: INFORMATION CONFIRMATION LIST.exeJoe Sandbox ML: detected
        Machine Learning detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 27.0.dhcpmon.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 24.0.dhcpmon.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 24.0.dhcpmon.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.unpackAvira: Label: TR/NanoCore.fadte
        Source: 27.0.dhcpmon.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 24.0.dhcpmon.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 27.0.dhcpmon.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 27.0.dhcpmon.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 24.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 24.0.dhcpmon.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 27.0.dhcpmon.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 27.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 24.0.dhcpmon.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: INFORMATION CONFIRMATION LIST.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: INFORMATION CONFIRMATION LIST.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking:

        barindex
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: kashbilly.ddns.net
        Source: global trafficTCP traffic: 192.168.2.5:49754 -> 197.211.59.104:6060
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.263941042.00000000018C7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comttv
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: unknownDNS traffic detected: queries for: kashbilly.ddns.net
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.263697343.000000000152B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.526582144.0000000006160000.00000004.00020000.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dbb78e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.4124bed.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.411b78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.41205c4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.4094bed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.4064bed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc05c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3901728.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4011728.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.40605c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4044348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.405b78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.41205c4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.40605c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.40905c4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.408b78e.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.40905c4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.6164629.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3934348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc05c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc4bed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3934348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3901728.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4044348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4011728.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000018.00000000.302302805.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.312722643.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.261981801.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.526582144.0000000006160000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.259830236.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.512207738.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.295280234.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.309977599.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.342876940.00000000030D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.324466242.0000000004019000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.297703495.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.265183487.0000000004239000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.311061484.0000000003F99000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.333703399.0000000004049000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.316433634.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.518799524.0000000002D71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.341874563.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.260204856.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.324510699.0000000003889000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.342977338.00000000040D9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.332200661.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.310754452.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000000.306212068.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.295881871.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.333597444.0000000003041000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.523536861.0000000003DAA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.296607452.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.324314955.0000000003011000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.261090435.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000000.303465197.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.320716900.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000000.304879446.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.300771610.0000000003FC9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5944, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5760, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4532, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1400, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4404, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4860, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5344, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6280, type: MEMORYSTR

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dbb78e.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dbb78e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 24.2.dhcpmon.exe.30a9658.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 27.2.dhcpmon.exe.4124bed.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 27.2.dhcpmon.exe.411b78e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 27.2.dhcpmon.exe.411b78e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 27.2.dhcpmon.exe.41205c4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.2.dhcpmon.exe.4094bed.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.4064bed.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc05c4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.dhcpmon.exe.3901728.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.dhcpmon.exe.3901728.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.2db3410.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.dhcpmon.exe.4011728.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.dhcpmon.exe.4011728.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 27.2.dhcpmon.exe.3139658.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.5f00000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.40605c4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.dhcpmon.exe.4044348.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.dhcpmon.exe.4044348.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 24.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.405b78e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.405b78e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 27.2.dhcpmon.exe.41205c4.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.40605c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 24.2.dhcpmon.exe.40905c4.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 24.2.dhcpmon.exe.408b78e.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.2.dhcpmon.exe.408b78e.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 24.2.dhcpmon.exe.40905c4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.30796ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.6164629.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.dhcpmon.exe.3934348.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.dhcpmon.exe.3934348.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc05c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc4bed.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.dhcpmon.exe.3934348.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.dhcpmon.exe.3934348.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.dhcpmon.exe.3901728.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.dhcpmon.exe.3901728.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.dhcpmon.exe.4044348.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.dhcpmon.exe.4044348.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.dhcpmon.exe.4011728.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.dhcpmon.exe.4011728.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000018.00000000.302302805.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000018.00000000.302302805.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001B.00000000.312722643.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001B.00000000.312722643.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000000.261981801.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000000.261981801.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.526582144.0000000006160000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000000.259830236.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000000.259830236.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.512207738.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000002.512207738.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000000.295280234.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000015.00000000.295280234.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001B.00000000.309977599.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001B.00000000.309977599.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001B.00000002.342876940.00000000030D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000002.324466242.0000000004019000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000000.297703495.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000015.00000000.297703495.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.265183487.0000000004239000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.265183487.0000000004239000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000D.00000002.311061484.0000000003F99000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000D.00000002.311061484.0000000003F99000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000018.00000002.333703399.0000000004049000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001B.00000000.316433634.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001B.00000000.316433634.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001B.00000002.341874563.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001B.00000002.341874563.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000000.260204856.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000000.260204856.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000002.324510699.0000000003889000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000010.00000002.324510699.0000000003889000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001B.00000002.342977338.00000000040D9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000018.00000002.332200661.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000018.00000002.332200661.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001B.00000000.310754452.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001B.00000000.310754452.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000018.00000000.306212068.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000018.00000000.306212068.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000000.295881871.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000015.00000000.295881871.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000018.00000002.333597444.0000000003041000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.523536861.0000000003DAA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000000.296607452.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000015.00000000.296607452.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000002.324314955.0000000003011000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000000.261090435.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000000.261090435.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000018.00000000.303465197.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000018.00000000.303465197.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.524911015.0000000005F00000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000015.00000002.320716900.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000015.00000002.320716900.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000018.00000000.304879446.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000018.00000000.304879446.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.300771610.0000000003FC9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000002.300771610.0000000003FC9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5944, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5944, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5760, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5760, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4532, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4532, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 1400, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 1400, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 4404, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 4404, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4860, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4860, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 5344, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 5344, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 6280, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 6280, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: INFORMATION CONFIRMATION LIST.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dbb78e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dbb78e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dbb78e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 24.2.dhcpmon.exe.30a9658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.dhcpmon.exe.30a9658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 27.2.dhcpmon.exe.4124bed.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 27.2.dhcpmon.exe.4124bed.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 27.2.dhcpmon.exe.411b78e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 27.2.dhcpmon.exe.411b78e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 27.2.dhcpmon.exe.411b78e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 27.2.dhcpmon.exe.41205c4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 27.2.dhcpmon.exe.41205c4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 24.2.dhcpmon.exe.4094bed.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.dhcpmon.exe.4094bed.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.4064bed.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.4064bed.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 24.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 24.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc05c4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc05c4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.dhcpmon.exe.3901728.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.dhcpmon.exe.3901728.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.dhcpmon.exe.3901728.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.2db3410.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.2db3410.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 24.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 24.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.dhcpmon.exe.4011728.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.dhcpmon.exe.4011728.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 13.2.dhcpmon.exe.4011728.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 27.2.dhcpmon.exe.3139658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 27.2.dhcpmon.exe.3139658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.5f00000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.5f00000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 24.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 24.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.40605c4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.40605c4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 13.2.dhcpmon.exe.4044348.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.dhcpmon.exe.4044348.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 13.2.dhcpmon.exe.4044348.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 24.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 24.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.405b78e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.405b78e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.405b78e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 27.2.dhcpmon.exe.41205c4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 27.2.dhcpmon.exe.41205c4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.40605c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.40605c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 24.2.dhcpmon.exe.40905c4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.dhcpmon.exe.40905c4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 24.2.dhcpmon.exe.408b78e.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.dhcpmon.exe.408b78e.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 24.2.dhcpmon.exe.408b78e.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 24.2.dhcpmon.exe.40905c4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.dhcpmon.exe.40905c4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 24.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 24.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.30796ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.INFORMATION CONFIRMATION LIST.exe.30796ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.6164629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.6164629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.dhcpmon.exe.3934348.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.dhcpmon.exe.3934348.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.dhcpmon.exe.3934348.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc05c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc05c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc4bed.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc4bed.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.dhcpmon.exe.3934348.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.dhcpmon.exe.3934348.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.dhcpmon.exe.3901728.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.dhcpmon.exe.3901728.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.dhcpmon.exe.4044348.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.dhcpmon.exe.4044348.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.dhcpmon.exe.4011728.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.dhcpmon.exe.4011728.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000018.00000000.302302805.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000018.00000000.302302805.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001B.00000000.312722643.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001B.00000000.312722643.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000000.261981801.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000000.261981801.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.526582144.0000000006160000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.526582144.0000000006160000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000001.00000000.259830236.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000000.259830236.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.512207738.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.512207738.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000000.295280234.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000015.00000000.295280234.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001B.00000000.309977599.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001B.00000000.309977599.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001B.00000002.342876940.00000000030D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000002.324466242.0000000004019000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000000.297703495.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000015.00000000.297703495.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.265183487.0000000004239000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.265183487.0000000004239000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000D.00000002.311061484.0000000003F99000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000D.00000002.311061484.0000000003F99000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000018.00000002.333703399.0000000004049000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001B.00000000.316433634.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001B.00000000.316433634.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001B.00000002.341874563.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001B.00000002.341874563.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000000.260204856.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000000.260204856.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000002.324510699.0000000003889000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000010.00000002.324510699.0000000003889000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001B.00000002.342977338.00000000040D9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000018.00000002.332200661.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000018.00000002.332200661.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001B.00000000.310754452.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001B.00000000.310754452.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000018.00000000.306212068.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000018.00000000.306212068.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000000.295881871.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000015.00000000.295881871.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000018.00000002.333597444.0000000003041000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.523536861.0000000003DAA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000000.296607452.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000015.00000000.296607452.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000002.324314955.0000000003011000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000000.261090435.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000000.261090435.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000018.00000000.303465197.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000018.00000000.303465197.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.524911015.0000000005F00000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.524911015.0000000005F00000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000015.00000002.320716900.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000015.00000002.320716900.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000018.00000000.304879446.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000018.00000000.304879446.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.300771610.0000000003FC9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.300771610.0000000003FC9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5944, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5944, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5760, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5760, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4532, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4532, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 1400, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 1400, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 4404, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 4404, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4860, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4860, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 5344, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 5344, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 6280, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 6280, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 0_2_0311E6B00_2_0311E6B0
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 0_2_0311C2840_2_0311C284
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 0_2_0311E6AB0_2_0311E6AB
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 1_2_02B9E4801_2_02B9E480
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 1_2_02B9E4711_2_02B9E471
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 1_2_02B9BBD41_2_02B9BBD4
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 1_2_066400401_2_06640040
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 8_2_015CE6B08_2_015CE6B0
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 8_2_015CC2848_2_015CC284
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 8_2_015CE6A28_2_015CE6A2
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_02E2E6B013_2_02E2E6B0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_02E2C28413_2_02E2C284
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_02E2E6AA13_2_02E2E6AA
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_02E2456913_2_02E24569
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_08F3004013_2_08F30040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_08F35B6813_2_08F35B68
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_08F3818013_2_08F38180
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_08F3817013_2_08F38170
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_08F3A11813_2_08F3A118
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_08F383E813_2_08F383E8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_08F383DB13_2_08F383DB
        Source: INFORMATION CONFIRMATION LIST.exeBinary or memory string: OriginalFilename vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.265183487.0000000004239000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dllF vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.263697343.000000000152B000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000000.240622186.0000000000EC2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFoundDatePatte.exe: vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.269769736.00000000097C0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exeBinary or memory string: OriginalFilename vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000000.256258556.00000000007D2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFoundDatePatte.exe: vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.526582144.0000000006160000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.526582144.0000000006160000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.518799524.0000000002D71000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.523536861.0000000003DAA000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.523536861.0000000003DAA000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.523536861.0000000003DAA000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.524911015.0000000005F00000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.527688505.0000000006600000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exeBinary or memory string: OriginalFilename vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000008.00000002.299630429.000000000138A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000008.00000002.306356765.00000000073F0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000008.00000002.300771610.0000000003FC9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dllF vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000008.00000002.298844131.0000000000C32000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFoundDatePatte.exe: vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000012.00000000.288133600.00000000001A2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFoundDatePatte.exe: vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000015.00000000.297862581.0000000000B72000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFoundDatePatte.exe: vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000015.00000002.323191417.000000000125A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000015.00000002.324466242.0000000004019000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000015.00000002.324466242.0000000004019000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000015.00000002.324466242.0000000004019000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000015.00000002.324314955.0000000003011000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exe, 00000015.00000002.324314955.0000000003011000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exeBinary or memory string: OriginalFilenameFoundDatePatte.exe: vs INFORMATION CONFIRMATION LIST.exe
        Source: INFORMATION CONFIRMATION LIST.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: dhcpmon.exe.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: INFORMATION CONFIRMATION LIST.exeVirustotal: Detection: 27%
        Source: INFORMATION CONFIRMATION LIST.exeReversingLabs: Detection: 32%
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeFile read: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeJump to behavior
        Source: INFORMATION CONFIRMATION LIST.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe "C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe"
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp820C.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe "C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe" 0
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp8CCB.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp820C.tmpJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp8CCB.tmpJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\INFORMATION CONFIRMATION LIST.exe.logJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeFile created: C:\Users\user\AppData\Local\Temp\tmp820C.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@24/8@7/1
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{51e297f7-7758-4d32-86af-0aafa20a3f56}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4604:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4556:120:WilError_01
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: INFORMATION CONFIRMATION LIST.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: INFORMATION CONFIRMATION LIST.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: INFORMATION CONFIRMATION LIST.exe, Auto_Machine/AutoMachine.cs.Net Code: P_000001 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.ec0000.0.unpack, Auto_Machine/AutoMachine.cs.Net Code: P_000001 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: dhcpmon.exe.1.dr, Auto_Machine/AutoMachine.cs.Net Code: P_000001 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.7d0000.9.unpack, Auto_Machine/AutoMachine.cs.Net Code: P_000001 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.7d0000.0.unpack, Auto_Machine/AutoMachine.cs.Net Code: P_000001 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.7d0000.5.unpack, Auto_Machine/AutoMachine.cs.Net Code: P_000001 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.7d0000.3.unpack, Auto_Machine/AutoMachine.cs.Net Code: P_000001 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.7d0000.1.unpack, Auto_Machine/AutoMachine.cs.Net Code: P_000001 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.7d0000.11.unpack, Auto_Machine/AutoMachine.cs.Net Code: P_000001 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.7d0000.7.unpack, Auto_Machine/AutoMachine.cs.Net Code: P_000001 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.7d0000.2.unpack, Auto_Machine/AutoMachine.cs.Net Code: P_000001 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        .NET source code contains method to dynamically call methods (often used by packers)Show sources
        Source: INFORMATION CONFIRMATION LIST.exe, Auto_Machine/AutoMachine.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
        Source: 0.2.INFORMATION CONFIRMATION LIST.exe.ec0000.0.unpack, Auto_Machine/AutoMachine.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
        Source: dhcpmon.exe.1.dr, Auto_Machine/AutoMachine.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.7d0000.9.unpack, Auto_Machine/AutoMachine.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.7d0000.0.unpack, Auto_Machine/AutoMachine.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.7d0000.5.unpack, Auto_Machine/AutoMachine.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.7d0000.3.unpack, Auto_Machine/AutoMachine.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.7d0000.1.unpack, Auto_Machine/AutoMachine.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.7d0000.11.unpack, Auto_Machine/AutoMachine.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.7d0000.7.unpack, Auto_Machine/AutoMachine.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.7d0000.2.unpack, Auto_Machine/AutoMachine.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 0_2_00EC76EA push es; ret 0_2_00EC7F94
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 0_2_09683B4D push FFFFFF8Bh; iretd 0_2_09683B4F
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 0_2_09683A52 push dword ptr [ebx+ebp-75h]; iretd 0_2_09683A5D
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 1_2_007D76EA push es; ret 1_2_007D7F94
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 8_2_00C376EA push es; ret 8_2_00C37F94
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 8_2_071B3C0D push FFFFFF8Bh; iretd 8_2_071B3C0F
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeCode function: 8_2_071B3B12 push dword ptr [ebx+ebp-75h]; iretd 8_2_071B3B1D
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_00BE76EA push es; ret 13_2_00BE7F94
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_07213C0D push FFFFFF8Bh; iretd 13_2_07213C0F
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_07213B12 push dword ptr [ebx+ebp-75h]; iretd 13_2_07213B1D
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_08F3D9F8 push es; ret 13_2_08F3D9F9
        Source: initial sampleStatic PE information: section name: .text entropy: 7.66243187306
        Source: initial sampleStatic PE information: section name: .text entropy: 7.66243187306
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp820C.tmp

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeFile opened: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe:Zone.Identifier read attributes | deleteJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: 16.2.dhcpmon.exe.2911e34.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.308b954.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3021e48.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.32c1e84.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.3051e84.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.297b940.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.30bba30.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.332ba30.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000008.00000002.300404167.0000000003064000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.310564174.0000000002F91000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.323912695.0000000002924000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.264212005.00000000032D4000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.264080160.0000000003231000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.323677605.0000000002881000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.300307230.0000000002FC1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.310696295.0000000003034000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5944, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4532, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1400, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4404, type: MEMORYSTR
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.264212005.00000000032D4000.00000004.00000001.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.264080160.0000000003231000.00000004.00000001.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000008.00000002.300404167.0000000003064000.00000004.00000001.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000008.00000002.300307230.0000000002FC1000.00000004.00000001.sdmp, dhcpmon.exe, 0000000D.00000002.310564174.0000000002F91000.00000004.00000001.sdmp, dhcpmon.exe, 0000000D.00000002.310696295.0000000003034000.00000004.00000001.sdmp, dhcpmon.exe, 00000010.00000002.323912695.0000000002924000.00000004.00000001.sdmp, dhcpmon.exe, 00000010.00000002.323677605.0000000002881000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.264212005.00000000032D4000.00000004.00000001.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.264080160.0000000003231000.00000004.00000001.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000008.00000002.300404167.0000000003064000.00000004.00000001.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000008.00000002.300307230.0000000002FC1000.00000004.00000001.sdmp, dhcpmon.exe, 0000000D.00000002.310564174.0000000002F91000.00000004.00000001.sdmp, dhcpmon.exe, 0000000D.00000002.310696295.0000000003034000.00000004.00000001.sdmp, dhcpmon.exe, 00000010.00000002.323912695.0000000002924000.00000004.00000001.sdmp, dhcpmon.exe, 00000010.00000002.323677605.0000000002881000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe TID: 6016Thread sleep time: -33320s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe TID: 4320Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe TID: 4308Thread sleep time: -20291418481080494s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe TID: 6032Thread sleep time: -35080s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe TID: 5712Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3560Thread sleep time: -33874s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5724Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5780Thread sleep time: -34374s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6128Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe TID: 6184Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6308Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6444Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeWindow / User API: threadDelayed 4715Jump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeWindow / User API: threadDelayed 4754Jump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeWindow / User API: foregroundWindowGot 848Jump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeThread delayed: delay time: 33320Jump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeThread delayed: delay time: 35080Jump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 33874Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 34374Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: dhcpmon.exe, 00000010.00000002.323677605.0000000002881000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
        Source: dhcpmon.exe, 00000010.00000002.323677605.0000000002881000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 00000010.00000002.323677605.0000000002881000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: dhcpmon.exe, 00000010.00000002.323677605.0000000002881000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeMemory written: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeMemory written: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp820C.tmpJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp8CCB.tmpJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeProcess created: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.522014006.0000000003300000.00000004.00000001.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.519294102.0000000002DFD000.00000004.00000001.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.521705733.000000000302F000.00000004.00000001.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.522036495.000000000330C000.00000004.00000001.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.522077860.000000000333A000.00000004.00000001.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.527957291.0000000006B4D000.00000004.00000010.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.521868372.00000000031BC000.00000004.00000001.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.520798752.0000000002EA7000.00000004.00000001.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.526501260.000000000604B000.00000004.00000010.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.522102865.000000000334A000.00000004.00000001.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.526663527.00000000062BD000.00000004.00000010.sdmpBinary or memory string: Program Manager
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.516841599.00000000015F0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.516841599.00000000015F0000.00000002.00020000.sdmpBinary or memory string: Progman
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.516841599.00000000015F0000.00000002.00020000.sdmpBinary or memory string: SProgram Managerl
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.516841599.00000000015F0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd,
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.516841599.00000000015F0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.521705733.000000000302F000.00000004.00000001.sdmp, INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.520798752.0000000002EA7000.00000004.00000001.sdmpBinary or memory string: Program Manager@
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dbb78e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.4124bed.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.411b78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.41205c4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.4094bed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.4064bed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc05c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3901728.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4011728.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.40605c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4044348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.405b78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.41205c4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.40605c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.40905c4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.408b78e.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.40905c4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.6164629.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3934348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc05c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc4bed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3934348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3901728.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4044348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4011728.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000018.00000000.302302805.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.312722643.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.261981801.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.526582144.0000000006160000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.259830236.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.512207738.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.295280234.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.309977599.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.342876940.00000000030D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.324466242.0000000004019000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.297703495.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.265183487.0000000004239000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.311061484.0000000003F99000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.333703399.0000000004049000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.316433634.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.518799524.0000000002D71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.341874563.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.260204856.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.324510699.0000000003889000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.342977338.00000000040D9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.332200661.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.310754452.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000000.306212068.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.295881871.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.333597444.0000000003041000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.523536861.0000000003DAA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.296607452.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.324314955.0000000003011000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.261090435.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000000.303465197.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.320716900.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000000.304879446.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.300771610.0000000003FC9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5944, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5760, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4532, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1400, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4404, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4860, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5344, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6280, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.265183487.0000000004239000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.526582144.0000000006160000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000000.261981801.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.518799524.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.518799524.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.523536861.0000000003DAA000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.523536861.0000000003DAA000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.524911015.0000000005F00000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: INFORMATION CONFIRMATION LIST.exe, 00000001.00000002.524911015.0000000005F00000.00000004.00020000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: INFORMATION CONFIRMATION LIST.exe, 00000008.00000002.300771610.0000000003FC9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 0000000D.00000002.311061484.0000000003F99000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000010.00000002.324510699.0000000003889000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: INFORMATION CONFIRMATION LIST.exe, 00000015.00000000.295280234.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: INFORMATION CONFIRMATION LIST.exe, 00000015.00000002.324466242.0000000004019000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: INFORMATION CONFIRMATION LIST.exe, 00000015.00000002.324466242.0000000004019000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: INFORMATION CONFIRMATION LIST.exe, 00000015.00000002.324314955.0000000003011000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: INFORMATION CONFIRMATION LIST.exe, 00000015.00000002.324314955.0000000003011000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000018.00000000.302302805.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000018.00000002.333703399.0000000004049000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000018.00000002.333703399.0000000004049000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000018.00000002.333597444.0000000003041000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000018.00000002.333597444.0000000003041000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 0000001B.00000000.312722643.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 0000001B.00000002.342876940.00000000030D1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 0000001B.00000002.342876940.00000000030D1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 0000001B.00000002.342977338.00000000040D9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 0000001B.00000002.342977338.00000000040D9000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dbb78e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.4124bed.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.411b78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.41205c4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.4094bed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.4064bed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc05c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3901728.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4011728.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.40605c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4044348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.405b78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.41205c4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.INFORMATION CONFIRMATION LIST.exe.40605c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.40905c4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.408b78e.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.40905c4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.6164629.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3934348.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc05c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.INFORMATION CONFIRMATION LIST.exe.3dc4bed.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3934348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4074348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.3901728.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42e4348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4044348.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.INFORMATION CONFIRMATION LIST.exe.4041728.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.INFORMATION CONFIRMATION LIST.exe.42b1728.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.4011728.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000018.00000000.302302805.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.312722643.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.261981801.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.526582144.0000000006160000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.259830236.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.512207738.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.295280234.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.309977599.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.342876940.00000000030D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.324466242.0000000004019000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.297703495.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.265183487.0000000004239000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.311061484.0000000003F99000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.333703399.0000000004049000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.316433634.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.518799524.0000000002D71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.341874563.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.260204856.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.324510699.0000000003889000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.342977338.00000000040D9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.332200661.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000000.310754452.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000000.306212068.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.295881871.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.333597444.0000000003041000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.523536861.0000000003DAA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000000.296607452.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.324314955.0000000003011000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.261090435.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000000.303465197.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.320716900.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000000.304879446.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.300771610.0000000003FC9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5944, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 5760, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4532, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1400, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4404, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: INFORMATION CONFIRMATION LIST.exe PID: 4860, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5344, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6280, type: MEMORYSTR

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection112Masquerading2Input Capture21Security Software Discovery21Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing23Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 552379 Sample: INFORMATION CONFIRMATION LIST.exe Startdate: 13/01/2022 Architecture: WINDOWS Score: 100 54 kashbilly.ddns.net 2->54 58 Malicious sample detected (through community Yara rule) 2->58 60 Multi AV Scanner detection for dropped file 2->60 62 Multi AV Scanner detection for submitted file 2->62 64 12 other signatures 2->64 9 INFORMATION CONFIRMATION LIST.exe 3 2->9         started        13 dhcpmon.exe 3 2->13         started        15 dhcpmon.exe 2 2->15         started        17 INFORMATION CONFIRMATION LIST.exe 2 2->17         started        signatures3 process4 file5 52 C:\...\INFORMATION CONFIRMATION LIST.exe.log, ASCII 9->52 dropped 68 Injects a PE file into a foreign processes 9->68 19 INFORMATION CONFIRMATION LIST.exe 1 12 9->19         started        24 dhcpmon.exe 13->24         started        26 dhcpmon.exe 13->26         started        28 dhcpmon.exe 15->28         started        30 dhcpmon.exe 15->30         started        32 INFORMATION CONFIRMATION LIST.exe 2 17->32         started        34 INFORMATION CONFIRMATION LIST.exe 17->34         started        signatures6 process7 dnsIp8 56 kashbilly.ddns.net 197.211.59.104, 6060 globacom-asNG Nigeria 19->56 44 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->44 dropped 46 C:\Users\user\AppData\Roaming\...\run.dat, data 19->46 dropped 48 C:\Users\user\AppData\Local\...\tmp820C.tmp, XML 19->48 dropped 50 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 19->50 dropped 66 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->66 36 schtasks.exe 1 19->36         started        38 schtasks.exe 1 19->38         started        file9 signatures10 process11 process12 40 conhost.exe 36->40         started        42 conhost.exe 38->42         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        INFORMATION CONFIRMATION LIST.exe28%VirustotalBrowse
        INFORMATION CONFIRMATION LIST.exe33%ReversingLabsByteCode-MSIL.Trojan.NanoBot
        INFORMATION CONFIRMATION LIST.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe28%VirustotalBrowse
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe33%ReversingLabsByteCode-MSIL.Trojan.NanoBot

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        21.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        27.0.dhcpmon.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        21.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        24.0.dhcpmon.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        24.0.dhcpmon.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        21.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.2.INFORMATION CONFIRMATION LIST.exe.6160000.7.unpack100%AviraTR/NanoCore.fadteDownload File
        27.0.dhcpmon.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        24.0.dhcpmon.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        27.0.dhcpmon.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        27.0.dhcpmon.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        21.2.INFORMATION CONFIRMATION LIST.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.0.INFORMATION CONFIRMATION LIST.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.0.INFORMATION CONFIRMATION LIST.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        24.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        24.0.dhcpmon.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        21.0.INFORMATION CONFIRMATION LIST.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        27.0.dhcpmon.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        27.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.0.INFORMATION CONFIRMATION LIST.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        24.0.dhcpmon.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        21.0.INFORMATION CONFIRMATION LIST.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.fontbureau.comttv0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        kashbilly.ddns.net
        197.211.59.104
        truefalse
          high

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
            high
            http://www.fontbureau.comINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
              high
              http://www.fontbureau.com/designersGINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designers/?INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                    high
                    http://www.tiro.comINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                      high
                      http://www.goodfont.co.krINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/cTheINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-jones.htmlINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                          high
                          http://www.fontbureau.comttvINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.263941042.00000000018C7000.00000004.00000040.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/DPleaseINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8INFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                            high
                            http://www.fonts.comINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                              high
                              http://www.sandoll.co.krINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deDPleaseINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sakkal.comINFORMATION CONFIRMATION LIST.exe, 00000000.00000002.267780920.0000000007422000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              197.211.59.104
                              kashbilly.ddns.netNigeria
                              37148globacom-asNGfalse

                              General Information

                              Joe Sandbox Version:34.0.0 Boulder Opal
                              Analysis ID:552379
                              Start date:13.01.2022
                              Start time:09:26:17
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 13m 21s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Sample file name:INFORMATION CONFIRMATION LIST.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:37
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@24/8@7/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:
                              • Successful, ratio: 0.2% (good quality ratio 0.2%)
                              • Quality average: 60.7%
                              • Quality standard deviation: 33.4%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 103
                              • Number of non-executed functions: 1
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report creation exceeded maximum time and may have missing disassembly code information.
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              09:27:19API Interceptor893x Sleep call for process: INFORMATION CONFIRMATION LIST.exe modified
                              09:27:26AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              09:27:28Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe" s>$(Arg0)
                              09:27:32Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                              09:27:37API Interceptor2x Sleep call for process: dhcpmon.exe modified

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              No context

                              ASN

                              No context

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Process:C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):501760
                              Entropy (8bit):7.649885964608304
                              Encrypted:false
                              SSDEEP:12288:WoDPV+dqhMU9PqlAKDWFyMjK3HOiXThh:FDsdqhMSPqCyYqv
                              MD5:6C6B35176645588B4B9A12B22B373ACB
                              SHA1:4C6DA16811CB1F8C4877C34E517A4839D0D118E8
                              SHA-256:2A599C2395394C8A00D1689E9CA6C2481062EBB70C02C905562E68D7087B875C
                              SHA-512:9761AF17CDCFF220EA97D64EE4300BA0FC7F6CB043E9A2DDDBA9CAAA50953F6139299313505B467565AF169FD1E41DB04990C4D5222D349034F523F1D3460631
                              Malicious:true
                              Antivirus:
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: Virustotal, Detection: 28%, Browse
                              • Antivirus: ReversingLabs, Detection: 33%
                              Reputation:unknown
                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a..............0.................. ........@.. ....................................@.................................L...O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......@d...Z......0.......0............................................0..F........r...p.(....(....s......{.....rC..po....o......{.....rS..po....o.....*...}.....(.......(.......}......{....(.....*...0..T.........{.....}....(....o.......(.....(....Y.Y.(....o.......( ....(!...Y.Y....s"...(#....*:..{.....}....*..*&..($....*.0..+.........,..{.......+....,...{....o%.......(&....*..0..H.........s'...}.....s(...}.....s'...}.....s'...}.....s)...}.....s*...}.....{....o+.....(,.....{
                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                              Process:C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:true
                              Reputation:unknown
                              Preview: [ZoneTransfer]....ZoneId=0
                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\INFORMATION CONFIRMATION LIST.exe.log
                              Process:C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1310
                              Entropy (8bit):5.345651901398759
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x847mE4P:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzQ
                              MD5:A9EFF9253CAF99EC8665E41D736DDAED
                              SHA1:D95BB4ABC856D774DA4602A59DE252B4BF560530
                              SHA-256:DBC637B33F1F3CD1AB40AFED23F94C4571CA43621EBB52C5DC267DBDC52D4783
                              SHA-512:96B67A84B750589BDB758224641065919F34BBF02BB286B9F5D566B48965A0E38FB88308B61351A6E11C46B76BFEC370FBC8B978A9F0F07A847567172D5CA5F3
                              Malicious:true
                              Reputation:unknown
                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1310
                              Entropy (8bit):5.345651901398759
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x847mE4P:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzQ
                              MD5:A9EFF9253CAF99EC8665E41D736DDAED
                              SHA1:D95BB4ABC856D774DA4602A59DE252B4BF560530
                              SHA-256:DBC637B33F1F3CD1AB40AFED23F94C4571CA43621EBB52C5DC267DBDC52D4783
                              SHA-512:96B67A84B750589BDB758224641065919F34BBF02BB286B9F5D566B48965A0E38FB88308B61351A6E11C46B76BFEC370FBC8B978A9F0F07A847567172D5CA5F3
                              Malicious:false
                              Reputation:unknown
                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                              C:\Users\user\AppData\Local\Temp\tmp820C.tmp
                              Process:C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1320
                              Entropy (8bit):5.125318589632226
                              Encrypted:false
                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0PJ7xtn:cbk4oL600QydbQxIYODOLedq3SVj
                              MD5:F2434F2DB8347B1BEA87A32E049BC791
                              SHA1:F67766FBF90E2A08006DAD5938C7FD75A5DEC85E
                              SHA-256:2D0AF243475F94BFB88409A06463575603EB6610A67DDFC03FD928B66E3EAAAF
                              SHA-512:ADF101EC58935FFA47A348B7B0E088A49D4CA759AB77D555493A79CBE30BE973BBF400776F313420E135D978E054E26E5744286691502B7677504F89D67D0EEC
                              Malicious:true
                              Reputation:unknown
                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                              C:\Users\user\AppData\Local\Temp\tmp8CCB.tmp
                              Process:C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:modified
                              Size (bytes):1310
                              Entropy (8bit):5.109425792877704
                              Encrypted:false
                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                              MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                              SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                              SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                              SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                              Malicious:false
                              Reputation:unknown
                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                              Process:C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8
                              Entropy (8bit):3.0
                              Encrypted:false
                              SSDEEP:3:Cw:L
                              MD5:ADC66397F14E88D6066BE489AD370EB7
                              SHA1:13A51034E7FE646C71A13CCDAF1633DFFB1A11F8
                              SHA-256:E0BAD6A8F28A278717B9D7050B5AA982675C076C6A93AE9A485E85AEFD11D890
                              SHA-512:1AC3D2ED11C9FF3D0DE7A46E02C01483AE672292B09990A9DD373234BABD4C0155FA8DBDFBC3234A1760843198951C132705FE952CC0AA5144473FB319414791
                              Malicious:true
                              Reputation:unknown
                              Preview: .......H
                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                              Process:C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):57
                              Entropy (8bit):4.5984246110664895
                              Encrypted:false
                              SSDEEP:3:oNUWJRWsrdhyTWJ:oNNJAsr7yaJ
                              MD5:7E562972A6FB64B037D0E7CD37E244F7
                              SHA1:E2E22DEB1F7018D7B7F34605ED99190A204D6B9F
                              SHA-256:65F6DF530F84EAF8D9E1D1AD3B8A1E4D80C07D6B2017E8558CD7A5D807C931A6
                              SHA-512:6A35A38432ADA25F2EA7B8D467A802D8E95A2BDA18D95E518F65AA60D576EA3551A110CA0E64A4CAF4ECB45F53C86E2CA5A010F4C03A676798B963F7D9A1991A
                              Malicious:false
                              Reputation:unknown
                              Preview: C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe

                              Static File Info

                              General

                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.649885964608304
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                              • Win32 Executable (generic) a (10002005/4) 49.75%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Windows Screen Saver (13104/52) 0.07%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              File name:INFORMATION CONFIRMATION LIST.exe
                              File size:501760
                              MD5:6c6b35176645588b4b9a12b22b373acb
                              SHA1:4c6da16811cb1f8c4877c34e517a4839d0d118e8
                              SHA256:2a599c2395394c8a00d1689e9ca6c2481062ebb70c02c905562e68d7087b875c
                              SHA512:9761af17cdcff220ea97d64ee4300ba0fc7f6cb043e9a2dddba9caaa50953f6139299313505b467565af169fd1e41db04990c4d5222d349034f523f1d3460631
                              SSDEEP:12288:WoDPV+dqhMU9PqlAKDWFyMjK3HOiXThh:FDsdqhMSPqCyYqv
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a..............0.................. ........@.. ....................................@................................

                              File Icon

                              Icon Hash:00828e8e8686b000

                              Static PE Info

                              General

                              Entrypoint:0x47bd9e
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x61DF8AF0 [Thu Jan 13 02:14:08 2022 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                              Entrypoint Preview

                              Instruction
                              jmp dword ptr [00402000h]
                              inc ecx
                              add byte ptr [edx+00h], al
                              push eax
                              add byte ptr [edx], ch
                              add byte ptr [23000000h], ch
                              add byte ptr [eax], al
                              add byte ptr [edi], cl
                              add byte ptr [eax], al
                              add byte ptr [00000000h], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x7bd4c0x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c0000x5e0.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x79dbc0x79e00False0.856899038462data7.66243187306IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0x7c0000x5e00x600False0.432942708333data4.15418868179IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x7e0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              RT_VERSION0x7c0900x350data
                              RT_MANIFEST0x7c3f00x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                              Imports

                              DLLImport
                              mscoree.dll_CorExeMain

                              Version Infos

                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyrightCopyright Tintai 2013
                              Assembly Version1.1.0.0
                              InternalNameFoundDatePatte.exe
                              FileVersion1.1.0.0
                              CompanyName
                              LegalTrademarks
                              Comments
                              ProductNameAuto Machine
                              ProductVersion1.1.0.0
                              FileDescriptionAuto Machine
                              OriginalFilenameFoundDatePatte.exe

                              Network Behavior

                              Snort IDS Alerts

                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              01/13/22-09:27:34.566953UDP254DNS SPOOF query response with TTL of 1 min. and no authority53547958.8.8.8192.168.2.5
                              01/13/22-09:27:51.551288UDP254DNS SPOOF query response with TTL of 1 min. and no authority53617338.8.8.8192.168.2.5
                              01/13/22-09:28:26.499132UDP254DNS SPOOF query response with TTL of 1 min. and no authority53601518.8.8.8192.168.2.5
                              01/13/22-09:29:21.787211UDP254DNS SPOOF query response with TTL of 1 min. and no authority53547918.8.8.8192.168.2.5

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Jan 13, 2022 09:27:34.583456039 CET497546060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:27:37.664482117 CET497546060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:27:43.664977074 CET497546060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:27:51.555352926 CET497576060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:27:54.556715012 CET497576060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:28:00.572623968 CET497576060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:28:08.281095982 CET497636060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:28:11.432997942 CET497636060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:28:17.433387041 CET497636060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:28:26.500771046 CET497736060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:28:29.512567997 CET497736060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:28:35.622417927 CET497736060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:28:44.977493048 CET498076060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:28:48.000818014 CET498076060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:28:53.998943090 CET498076060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:29:03.435981035 CET498136060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:29:06.437463999 CET498136060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:29:12.437952042 CET498136060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:29:21.788089037 CET498156060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:29:24.798358917 CET498156060192.168.2.5197.211.59.104
                              Jan 13, 2022 09:29:30.798979998 CET498156060192.168.2.5197.211.59.104

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Jan 13, 2022 09:27:34.545644045 CET5479553192.168.2.58.8.8.8
                              Jan 13, 2022 09:27:34.566952944 CET53547958.8.8.8192.168.2.5
                              Jan 13, 2022 09:27:51.530292034 CET6173353192.168.2.58.8.8.8
                              Jan 13, 2022 09:27:51.551287889 CET53617338.8.8.8192.168.2.5
                              Jan 13, 2022 09:28:08.262094975 CET5959653192.168.2.58.8.8.8
                              Jan 13, 2022 09:28:08.279342890 CET53595968.8.8.8192.168.2.5
                              Jan 13, 2022 09:28:26.480551958 CET6015153192.168.2.58.8.8.8
                              Jan 13, 2022 09:28:26.499131918 CET53601518.8.8.8192.168.2.5
                              Jan 13, 2022 09:28:44.956362963 CET5475753192.168.2.58.8.8.8
                              Jan 13, 2022 09:28:44.975611925 CET53547578.8.8.8192.168.2.5
                              Jan 13, 2022 09:29:03.416762114 CET6434553192.168.2.58.8.8.8
                              Jan 13, 2022 09:29:03.434125900 CET53643458.8.8.8192.168.2.5
                              Jan 13, 2022 09:29:21.768193007 CET5479153192.168.2.58.8.8.8
                              Jan 13, 2022 09:29:21.787210941 CET53547918.8.8.8192.168.2.5

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Jan 13, 2022 09:27:34.545644045 CET192.168.2.58.8.8.80x9089Standard query (0)kashbilly.ddns.netA (IP address)IN (0x0001)
                              Jan 13, 2022 09:27:51.530292034 CET192.168.2.58.8.8.80xd17cStandard query (0)kashbilly.ddns.netA (IP address)IN (0x0001)
                              Jan 13, 2022 09:28:08.262094975 CET192.168.2.58.8.8.80x3010Standard query (0)kashbilly.ddns.netA (IP address)IN (0x0001)
                              Jan 13, 2022 09:28:26.480551958 CET192.168.2.58.8.8.80xca66Standard query (0)kashbilly.ddns.netA (IP address)IN (0x0001)
                              Jan 13, 2022 09:28:44.956362963 CET192.168.2.58.8.8.80x7d4fStandard query (0)kashbilly.ddns.netA (IP address)IN (0x0001)
                              Jan 13, 2022 09:29:03.416762114 CET192.168.2.58.8.8.80x3d9fStandard query (0)kashbilly.ddns.netA (IP address)IN (0x0001)
                              Jan 13, 2022 09:29:21.768193007 CET192.168.2.58.8.8.80x6e94Standard query (0)kashbilly.ddns.netA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Jan 13, 2022 09:27:34.566952944 CET8.8.8.8192.168.2.50x9089No error (0)kashbilly.ddns.net197.211.59.104A (IP address)IN (0x0001)
                              Jan 13, 2022 09:27:51.551287889 CET8.8.8.8192.168.2.50xd17cNo error (0)kashbilly.ddns.net197.211.59.104A (IP address)IN (0x0001)
                              Jan 13, 2022 09:28:08.279342890 CET8.8.8.8192.168.2.50x3010No error (0)kashbilly.ddns.net197.211.59.104A (IP address)IN (0x0001)
                              Jan 13, 2022 09:28:26.499131918 CET8.8.8.8192.168.2.50xca66No error (0)kashbilly.ddns.net197.211.59.104A (IP address)IN (0x0001)
                              Jan 13, 2022 09:28:44.975611925 CET8.8.8.8192.168.2.50x7d4fNo error (0)kashbilly.ddns.net197.211.59.104A (IP address)IN (0x0001)
                              Jan 13, 2022 09:29:03.434125900 CET8.8.8.8192.168.2.50x3d9fNo error (0)kashbilly.ddns.net197.211.59.104A (IP address)IN (0x0001)
                              Jan 13, 2022 09:29:21.787210941 CET8.8.8.8192.168.2.50x6e94No error (0)kashbilly.ddns.net197.211.59.104A (IP address)IN (0x0001)

                              Code Manipulations

                              Statistics

                              CPU Usage

                              Click to jump to process

                              Memory Usage

                              Click to jump to process

                              High Level Behavior Distribution

                              Click to dive into process behavior distribution

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:09:27:12
                              Start date:13/01/2022
                              Path:C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe"
                              Imagebase:0xec0000
                              File size:501760 bytes
                              MD5 hash:6C6B35176645588B4B9A12B22B373ACB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.265183487.0000000004239000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.265183487.0000000004239000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.265183487.0000000004239000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.264212005.00000000032D4000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.264080160.0000000003231000.00000004.00000001.sdmp, Author: Joe Security
                              Reputation:low

                              General

                              Start time:09:27:20
                              Start date:13/01/2022
                              Path:C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
                              Imagebase:0x7d0000
                              File size:501760 bytes
                              MD5 hash:6C6B35176645588B4B9A12B22B373ACB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000000.261981801.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000000.261981801.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000001.00000000.261981801.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.526582144.0000000006160000.00000004.00020000.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.526582144.0000000006160000.00000004.00020000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.526582144.0000000006160000.00000004.00020000.sdmp, Author: Joe Security
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000000.259830236.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000000.259830236.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000001.00000000.259830236.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.512207738.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.512207738.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.512207738.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.518799524.0000000002D71000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000000.260204856.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000000.260204856.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000001.00000000.260204856.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.523536861.0000000003DAA000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.523536861.0000000003DAA000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000000.261090435.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000000.261090435.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000001.00000000.261090435.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.524911015.0000000005F00000.00000004.00020000.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.524911015.0000000005F00000.00000004.00020000.sdmp, Author: Florian Roth
                              Reputation:low

                              General

                              Start time:09:27:26
                              Start date:13/01/2022
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp820C.tmp
                              Imagebase:0x1270000
                              File size:185856 bytes
                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:09:27:27
                              Start date:13/01/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7ecfc0000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:09:27:28
                              Start date:13/01/2022
                              Path:C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe" 0
                              Imagebase:0x7ff797770000
                              File size:501760 bytes
                              MD5 hash:6C6B35176645588B4B9A12B22B373ACB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000008.00000002.300404167.0000000003064000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000008.00000002.300307230.0000000002FC1000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.300771610.0000000003FC9000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.300771610.0000000003FC9000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.300771610.0000000003FC9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              Reputation:low

                              General

                              Start time:09:27:29
                              Start date:13/01/2022
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp8CCB.tmp
                              Imagebase:0x1270000
                              File size:185856 bytes
                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:09:27:31
                              Start date:13/01/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7ecfc0000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:09:27:32
                              Start date:13/01/2022
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                              Imagebase:0xbe0000
                              File size:501760 bytes
                              MD5 hash:6C6B35176645588B4B9A12B22B373ACB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000D.00000002.310564174.0000000002F91000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.311061484.0000000003F99000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.311061484.0000000003F99000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.311061484.0000000003F99000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000D.00000002.310696295.0000000003034000.00000004.00000001.sdmp, Author: Joe Security
                              Antivirus matches:
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 28%, Virustotal, Browse
                              • Detection: 33%, ReversingLabs
                              Reputation:low

                              General

                              Start time:09:27:34
                              Start date:13/01/2022
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                              Imagebase:0x2f0000
                              File size:501760 bytes
                              MD5 hash:6C6B35176645588B4B9A12B22B373ACB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000002.324510699.0000000003889000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.324510699.0000000003889000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.324510699.0000000003889000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000010.00000002.323912695.0000000002924000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000010.00000002.323677605.0000000002881000.00000004.00000001.sdmp, Author: Joe Security
                              Reputation:low

                              General

                              Start time:09:27:34
                              Start date:13/01/2022
                              Path:C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
                              Imagebase:0x1a0000
                              File size:501760 bytes
                              MD5 hash:6C6B35176645588B4B9A12B22B373ACB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              General

                              Start time:09:27:36
                              Start date:13/01/2022
                              Path:C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\INFORMATION CONFIRMATION LIST.exe
                              Imagebase:0xb70000
                              File size:501760 bytes
                              MD5 hash:6C6B35176645588B4B9A12B22B373ACB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000000.295280234.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000000.295280234.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000015.00000000.295280234.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.324466242.0000000004019000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.324466242.0000000004019000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000000.297703495.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000000.297703495.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000015.00000000.297703495.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000000.295881871.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000000.295881871.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000015.00000000.295881871.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000000.296607452.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000000.296607452.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000015.00000000.296607452.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.324314955.0000000003011000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.324314955.0000000003011000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000002.320716900.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.320716900.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.320716900.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              Reputation:low

                              General

                              Start time:09:27:38
                              Start date:13/01/2022
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Imagebase:0x210000
                              File size:501760 bytes
                              MD5 hash:6C6B35176645588B4B9A12B22B373ACB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              General

                              Start time:09:27:40
                              Start date:13/01/2022
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Imagebase:0xce0000
                              File size:501760 bytes
                              MD5 hash:6C6B35176645588B4B9A12B22B373ACB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000000.302302805.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000000.302302805.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000018.00000000.302302805.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.333703399.0000000004049000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.333703399.0000000004049000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000002.332200661.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.332200661.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.332200661.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000000.306212068.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000000.306212068.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000018.00000000.306212068.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.333597444.0000000003041000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.333597444.0000000003041000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000000.303465197.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000000.303465197.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000018.00000000.303465197.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000000.304879446.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000000.304879446.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000018.00000000.304879446.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              Reputation:low

                              General

                              Start time:09:27:41
                              Start date:13/01/2022
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Imagebase:0x140000
                              File size:501760 bytes
                              MD5 hash:6C6B35176645588B4B9A12B22B373ACB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              General

                              Start time:09:27:43
                              Start date:13/01/2022
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Imagebase:0xdc0000
                              File size:501760 bytes
                              MD5 hash:6C6B35176645588B4B9A12B22B373ACB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000000.312722643.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000000.312722643.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000001B.00000000.312722643.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000000.309977599.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000000.309977599.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000001B.00000000.309977599.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000002.342876940.00000000030D1000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000001B.00000002.342876940.00000000030D1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000000.316433634.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000000.316433634.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000001B.00000000.316433634.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000002.341874563.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000002.341874563.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000001B.00000002.341874563.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000002.342977338.00000000040D9000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000001B.00000002.342977338.00000000040D9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000000.310754452.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000000.310754452.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000001B.00000000.310754452.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              Reputation:low

                              Disassembly

                              Code Analysis

                              Reset < >

                                Execution Graph

                                Execution Coverage:10.9%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:106
                                Total number of Limit Nodes:7

                                Graph

                                execution_graph 15670 31140d0 15671 31140d1 15670->15671 15672 31140f3 15671->15672 15676 31141f0 15671->15676 15681 3113870 15672->15681 15674 311411e 15677 3114215 15676->15677 15685 31142f0 15677->15685 15689 31142e1 15677->15689 15682 311387b 15681->15682 15697 3115684 15682->15697 15684 3116ab6 15684->15674 15687 31142f1 15685->15687 15686 31143f4 15686->15686 15687->15686 15693 3113e6c 15687->15693 15691 31142e4 15689->15691 15690 31143f4 15690->15690 15691->15690 15692 3113e6c CreateActCtxA 15691->15692 15692->15690 15694 3115380 CreateActCtxA 15693->15694 15696 3115443 15694->15696 15698 311568f 15697->15698 15701 31156a4 15698->15701 15700 3116b85 15700->15684 15702 31156af 15701->15702 15705 31156d4 15702->15705 15704 3116c62 15704->15700 15706 31156df 15705->15706 15709 3115704 15706->15709 15708 3116d62 15708->15704 15711 311570f 15709->15711 15710 31174bc 15710->15708 15711->15710 15714 311b508 15711->15714 15720 311b4f8 15711->15720 15715 311b509 15714->15715 15716 311b54d 15715->15716 15726 311b675 15715->15726 15730 311b6b8 15715->15730 15734 311b6a9 15715->15734 15716->15710 15721 311b4fc 15720->15721 15722 311b49f 15721->15722 15723 311b675 3 API calls 15721->15723 15724 311b6a9 3 API calls 15721->15724 15725 311b6b8 3 API calls 15721->15725 15722->15710 15723->15722 15724->15722 15725->15722 15727 311b684 15726->15727 15728 311b68b 15727->15728 15738 311a19c 15727->15738 15728->15716 15731 311b6bd 15730->15731 15732 311b6ff 15731->15732 15733 311a19c 3 API calls 15731->15733 15732->15716 15733->15732 15735 311b6b8 15734->15735 15736 311b6ff 15735->15736 15737 311a19c 3 API calls 15735->15737 15736->15716 15737->15736 15739 311a1a7 15738->15739 15741 311c3f8 15739->15741 15742 311bfb8 15739->15742 15741->15741 15743 311bfc3 15742->15743 15744 3115704 3 API calls 15743->15744 15745 311c467 15744->15745 15746 311c4a0 15745->15746 15748 311e214 15745->15748 15746->15741 15749 311e225 15748->15749 15750 311e22d 15748->15750 15749->15746 15755 311e668 LoadLibraryExW GetModuleHandleW 15750->15755 15756 311e65b LoadLibraryExW GetModuleHandleW 15750->15756 15751 311e265 15753 311f030 CreateWindowExW 15751->15753 15754 311f023 CreateWindowExW 15751->15754 15752 311e30a 15753->15752 15754->15752 15755->15751 15756->15751 15757 311b7d0 15758 311b7d5 15757->15758 15762 311b990 15758->15762 15766 311b983 15758->15766 15759 311b8e5 15763 311b995 15762->15763 15770 311a224 15763->15770 15767 311b990 15766->15767 15768 311a224 DuplicateHandle 15767->15768 15769 311b9be 15768->15769 15769->15759 15771 311b9f8 DuplicateHandle 15770->15771 15773 311b9be 15771->15773 15773->15759 15774 31193f0 15775 31193f5 15774->15775 15778 31194e8 15775->15778 15776 31193ff 15779 31194fb 15778->15779 15781 3119513 15779->15781 15786 3119770 15779->15786 15790 3119763 15779->15790 15780 311950b 15780->15781 15782 3119710 GetModuleHandleW 15780->15782 15781->15776 15783 311973d 15782->15783 15783->15776 15787 3119775 15786->15787 15789 31197a9 15787->15789 15794 3118818 15787->15794 15789->15780 15791 3119770 15790->15791 15792 3118818 LoadLibraryExW 15791->15792 15793 31197a9 15791->15793 15792->15793 15793->15780 15795 3119950 LoadLibraryExW 15794->15795 15797 31199c9 15795->15797 15797->15789 15798 9681080 15799 968120b 15798->15799 15800 96810a6 15798->15800 15800->15799 15803 96812f9 PostMessageW 15800->15803 15805 9681300 PostMessageW 15800->15805 15804 968136c 15803->15804 15804->15800 15806 968136c 15805->15806 15806->15800

                                Executed Functions

                                Memory Dump Source
                                • Source File: 00000000.00000002.264031877.0000000003110000.00000040.00000001.sdmp, Offset: 03110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3110000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3647871ea6c82fe48c5176285910f63034c24107aa3c314115eea80a41c4ea13
                                • Instruction ID: 0b959430989ced93add1d650771ca4028ca27047bf06a820279e7a1f3de54f59
                                • Opcode Fuzzy Hash: 3647871ea6c82fe48c5176285910f63034c24107aa3c314115eea80a41c4ea13
                                • Instruction Fuzzy Hash: 3C12D7F1431766CAD710DF65E98E1893FE1B745328F90E208E2612BAD1DFB8154AEF44
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.264031877.0000000003110000.00000040.00000001.sdmp, Offset: 03110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3110000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 350c78628d93a70534120927ca1ccf9b246fc84056dbd550df92ae387e23f33a
                                • Instruction ID: f2793c11470e0a8d249fc6bf7c36b277d26bd2638db9e106263e678b075c5de5
                                • Opcode Fuzzy Hash: 350c78628d93a70534120927ca1ccf9b246fc84056dbd550df92ae387e23f33a
                                • Instruction Fuzzy Hash: 57C118F1431756CADB10DF65E88A1893FE1BB85328F50E309E2616B6D1DFB81486EF84
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 295 311fce3-311fcea 296 311fcf1-311fd22 295->296 297 311fcec-311fcef 295->297 299 311fd24-311fd28 296->299 300 311fd29-311fd42 296->300 297->296 299->300 301 311fd44-311fd48 300->301 302 311fd49-311fd4a 300->302 301->302 303 311fd51-311fd62 302->303 304 311fd4c-311fd50 302->304 306 311fd64-311fd68 303->306 307 311fd69-311fd6a 303->307 304->303 306->307 308 311fd71-311fd8a 307->308 309 311fd6c-311fd6f 307->309 310 311fd91-311fdae 308->310 311 311fd8c-311fd90 308->311 309->308 313 311fdb0 310->313 314 311fdb5-311fdc2 310->314 311->310 315 311fdb3 313->315 316 311fdc4-311fdc8 314->316 317 311fdc9-311fdda 314->317 316->317 318 311fde1-311fde2 317->318 319 311fddc-311fde0 317->319 321 311fde4-311fde8 318->321 322 311fde9-311fe18 call 311dd34 318->322 319->315 320 311fde2 319->320 320->321 320->322 321->322 325 311fe1d-311fe1e 322->325
                                Memory Dump Source
                                • Source File: 00000000.00000002.264031877.0000000003110000.00000040.00000001.sdmp, Offset: 03110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3110000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 44ba5e26334fe8ca24ff18456d57a5a756f3df5f13b7da7a0217011626ac7f7b
                                • Instruction ID: 2308663f684299c13a190069e577efed6ca30e836b9942966bdbfd7193b86380
                                • Opcode Fuzzy Hash: 44ba5e26334fe8ca24ff18456d57a5a756f3df5f13b7da7a0217011626ac7f7b
                                • Instruction Fuzzy Hash: 14A17075C093899FCF02CFA5C854AC9FFB1FF4A304F1982AAE445AB262D3359856CB51
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 326 31194e8-31194fd call 31171d4 329 3119513-3119517 326->329 330 31194ff 326->330 331 3119519-3119523 329->331 332 311952b-311956c 329->332 379 3119505 call 3119770 330->379 380 3119505 call 3119763 330->380 331->332 337 3119579-3119587 332->337 338 311956e-3119576 332->338 333 311950b-311950d 333->329 335 3119648-3119708 333->335 374 3119710-311973b GetModuleHandleW 335->374 375 311970a-311970d 335->375 340 3119589-311958e 337->340 341 31195ab-31195ad 337->341 338->337 342 3119590-3119597 call 31187bc 340->342 343 3119599 340->343 344 31195b0-31195b7 341->344 347 311959b-31195a9 342->347 343->347 348 31195c4-31195cb 344->348 349 31195b9-31195c1 344->349 347->344 351 31195d8-31195e1 call 31187cc 348->351 352 31195cd-31195d5 348->352 349->348 356 31195e3-31195eb 351->356 357 31195ee-31195f3 351->357 352->351 356->357 359 3119611-311961e 357->359 360 31195f5-31195fc 357->360 367 3119641-3119647 359->367 368 3119620-311963e 359->368 360->359 361 31195fe-311960e call 31187dc call 31187ec 360->361 361->359 368->367 376 3119744-3119758 374->376 377 311973d-3119743 374->377 375->374 377->376 379->333 380->333
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0311972E
                                Memory Dump Source
                                • Source File: 00000000.00000002.264031877.0000000003110000.00000040.00000001.sdmp, Offset: 03110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3110000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 95eef2dd8e63a99ae4357018bee7566c0bb03e7c80b22f0f3f26901734452459
                                • Instruction ID: 770d834c4ed8a2320493893df5117e2ca0dc3c85facb741ca7bc66c545975c14
                                • Opcode Fuzzy Hash: 95eef2dd8e63a99ae4357018bee7566c0bb03e7c80b22f0f3f26901734452459
                                • Instruction Fuzzy Hash: D27153B0A00B058FD764CF6AC15479ABBF5BF88204F048A2ED49ADBA54DB34E855CF91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 381 311dd18-311dd32 384 311dd34 381->384 385 311dd39-311fe9e 381->385 384->385 388 311fea0-311fea6 385->388 389 311fea9-311feb0 385->389 388->389 390 311feb2-311feb8 389->390 391 311febb-311fef3 389->391 390->391 392 311fefb-311ff5a CreateWindowExW 391->392 393 311ff63-311ff9b 392->393 394 311ff5c-311ff62 392->394 398 311ffa8 393->398 399 311ff9d-311ffa0 393->399 394->393 400 311ffa9 398->400 399->398 400->400
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0311FF4A
                                Memory Dump Source
                                • Source File: 00000000.00000002.264031877.0000000003110000.00000040.00000001.sdmp, Offset: 03110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3110000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: 52b3efdafc7bf0e3aabb46f982b3118ff111f078c236a5a4dd49f65ad6459aad
                                • Instruction ID: 35789f59f5ec312745de36b3d3b1db702540b3ebdb0a4b0e357c48820b1b2593
                                • Opcode Fuzzy Hash: 52b3efdafc7bf0e3aabb46f982b3118ff111f078c236a5a4dd49f65ad6459aad
                                • Instruction Fuzzy Hash: A851E0B1C00309AFDB15CFA9C884ADEBBF5FF49314F25862AE419AB251D7749845CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 401 311dd34-311fe9e 405 311fea0-311fea6 401->405 406 311fea9-311feb0 401->406 405->406 407 311feb2-311feb8 406->407 408 311febb-311ff5a CreateWindowExW 406->408 407->408 410 311ff63-311ff9b 408->410 411 311ff5c-311ff62 408->411 415 311ffa8 410->415 416 311ff9d-311ffa0 410->416 411->410 417 311ffa9 415->417 416->415 417->417
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0311FF4A
                                Memory Dump Source
                                • Source File: 00000000.00000002.264031877.0000000003110000.00000040.00000001.sdmp, Offset: 03110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3110000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: 6e393879a66de4993f775d23f5a7523633521d1de5ee9c817d2fad3ecdc6c8b0
                                • Instruction ID: 70156ff8320f4e9b878fbbe188fc1b9e211b7a503b15b5f5e1b3a769a283a374
                                • Opcode Fuzzy Hash: 6e393879a66de4993f775d23f5a7523633521d1de5ee9c817d2fad3ecdc6c8b0
                                • Instruction Fuzzy Hash: 7A51B0B1D003099FDB14CF99C984ADEBBF5BF88314F24862AE419AB210D7749855CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 418 3115374-3115376 419 3115378-311537c 418->419 420 311537d-311537e 418->420 419->420 421 3115380-3115384 420->421 422 3115385-3115441 CreateActCtxA 420->422 421->422 424 3115443-3115449 422->424 425 311544a-31154a4 422->425 424->425 432 31154b3-31154b7 425->432 433 31154a6-31154a9 425->433 434 31154b9-31154c5 432->434 435 31154c8 432->435 433->432 434->435 437 31154c9 435->437 437->437
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 03115431
                                Memory Dump Source
                                • Source File: 00000000.00000002.264031877.0000000003110000.00000040.00000001.sdmp, Offset: 03110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3110000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 6febd039f50e130c27fbae92339f803398f5713e457f79abf7e5e6e3134c7d1a
                                • Instruction ID: 114170768e4a019d8ffac32f53f08979ea71467df5b978c06894f7c075c3f1cc
                                • Opcode Fuzzy Hash: 6febd039f50e130c27fbae92339f803398f5713e457f79abf7e5e6e3134c7d1a
                                • Instruction Fuzzy Hash: E24107B1C00729CFDB14CF9AC9447CEBBB6BF89308F248469D409AB251EB756945CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 438 3113e6c-3115441 CreateActCtxA 442 3115443-3115449 438->442 443 311544a-31154a4 438->443 442->443 450 31154b3-31154b7 443->450 451 31154a6-31154a9 443->451 452 31154b9-31154c5 450->452 453 31154c8 450->453 451->450 452->453 455 31154c9 453->455 455->455
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 03115431
                                Memory Dump Source
                                • Source File: 00000000.00000002.264031877.0000000003110000.00000040.00000001.sdmp, Offset: 03110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3110000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: d7ba9707c71e3e6772ecd64afc28499c187da4f182fa78c59b66619d3a0f1b02
                                • Instruction ID: 0a23b1684cfbd9fb8ba055c56f4a9f0e635c9119720793a2531270c66e55d17e
                                • Opcode Fuzzy Hash: d7ba9707c71e3e6772ecd64afc28499c187da4f182fa78c59b66619d3a0f1b02
                                • Instruction Fuzzy Hash: 1F410570C00718CFDB24CF9AC9847CEBBB6BF89304F648469D409AB251DB756945CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 456 311babb-311bac0 457 311bac2 456->457 458 311ba65-311ba8c DuplicateHandle 456->458 459 311bac4-311bac5 457->459 460 311bac9-311bbe6 457->460 461 311ba95-311bab2 458->461 462 311ba8e-311ba94 458->462 459->460 462->461
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0311B9BE,?,?,?,?,?), ref: 0311BA7F
                                Memory Dump Source
                                • Source File: 00000000.00000002.264031877.0000000003110000.00000040.00000001.sdmp, Offset: 03110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3110000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: a0637a5aeab8f39bdd829dbd7f74e9a237461e84d273882d2f3d172028558408
                                • Instruction ID: ea483be91c50cd46511d302efc4395c23dc7f4b2e04fdd2ff4a7b8c569d38d3f
                                • Opcode Fuzzy Hash: a0637a5aeab8f39bdd829dbd7f74e9a237461e84d273882d2f3d172028558408
                                • Instruction Fuzzy Hash: F931F574A64204DFEB04CF69F49A7A9BBB5E788752F10C02AF9059B381DF794811EF21
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 476 311a224-311ba8c DuplicateHandle 480 311ba95-311bab2 476->480 481 311ba8e-311ba94 476->481 481->480
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0311B9BE,?,?,?,?,?), ref: 0311BA7F
                                Memory Dump Source
                                • Source File: 00000000.00000002.264031877.0000000003110000.00000040.00000001.sdmp, Offset: 03110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3110000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: ed02a966148d1f6510965a23eff7511f57c14d789cb073756bf351f590c9f7b1
                                • Instruction ID: 15b4837f3667758c2164a4763dd30d466d5bf2912b5372757de403ec55d25d03
                                • Opcode Fuzzy Hash: ed02a966148d1f6510965a23eff7511f57c14d789cb073756bf351f590c9f7b1
                                • Instruction Fuzzy Hash: AC21E3B5900219EFDB10CF9AD584ADEBFF8EB48324F14842AE914A7310D374A954CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 484 311b9f0-311b9f6 485 311b9f8-311b9fc 484->485 486 311b9fd-311ba64 484->486 485->486 487 311ba65-311ba8c DuplicateHandle 486->487 488 311ba95-311bab2 487->488 489 311ba8e-311ba94 487->489 489->488
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0311B9BE,?,?,?,?,?), ref: 0311BA7F
                                Memory Dump Source
                                • Source File: 00000000.00000002.264031877.0000000003110000.00000040.00000001.sdmp, Offset: 03110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3110000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 9256e0258d91bd4dcc8c3e0e03ec8b5a90e2585fcd1ed83c8c3b94a99f3bccfa
                                • Instruction ID: a235b10a866a055f23706fac7cdb02251c06cfe1ace05f1ab36a875b4bc982cb
                                • Opcode Fuzzy Hash: 9256e0258d91bd4dcc8c3e0e03ec8b5a90e2585fcd1ed83c8c3b94a99f3bccfa
                                • Instruction Fuzzy Hash: 7621E5B5D00209AFDB10CFA9D584ADEBFF8EB48324F14846AE914A3310D374A954CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 492 3118818-3119990 494 3119992-3119995 492->494 495 3119998-31199c7 LoadLibraryExW 492->495 494->495 496 31199d0-31199ed 495->496 497 31199c9-31199cf 495->497 497->496
                                APIs
                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,031197A9,00000800,00000000,00000000), ref: 031199BA
                                Memory Dump Source
                                • Source File: 00000000.00000002.264031877.0000000003110000.00000040.00000001.sdmp, Offset: 03110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3110000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: 068acb4ef95cf7138fbf2f8aa499e1f7644f3b58d126843993eed96edb16a92f
                                • Instruction ID: fb4cc4bdfa8a9114849d75339a9956c9c2ea7b6edebf087f4d6bd408ec6a604c
                                • Opcode Fuzzy Hash: 068acb4ef95cf7138fbf2f8aa499e1f7644f3b58d126843993eed96edb16a92f
                                • Instruction Fuzzy Hash: 051103B69002099FDB10CF9AC588BDEFBF4AB88324F14842AE525B7610D374A545CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 500 311994b-3119990 502 3119992-3119995 500->502 503 3119998-31199c7 LoadLibraryExW 500->503 502->503 504 31199d0-31199ed 503->504 505 31199c9-31199cf 503->505 505->504
                                APIs
                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,031197A9,00000800,00000000,00000000), ref: 031199BA
                                Memory Dump Source
                                • Source File: 00000000.00000002.264031877.0000000003110000.00000040.00000001.sdmp, Offset: 03110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3110000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: 7bb74bf72c6eb0004ef76854bcc09f544152a75e27be85d89df16b286f945b53
                                • Instruction ID: bf0247665212e567782a979a980c660346f8f747e0bbf25eb687980ad114b399
                                • Opcode Fuzzy Hash: 7bb74bf72c6eb0004ef76854bcc09f544152a75e27be85d89df16b286f945b53
                                • Instruction Fuzzy Hash: B01114B2C002099FDB10CF9AC584BDEFBF8AB88324F14842AD425B7610C374A545CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 508 31196c8-3119708 509 3119710-311973b GetModuleHandleW 508->509 510 311970a-311970d 508->510 511 3119744-3119758 509->511 512 311973d-3119743 509->512 510->509 512->511
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0311972E
                                Memory Dump Source
                                • Source File: 00000000.00000002.264031877.0000000003110000.00000040.00000001.sdmp, Offset: 03110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3110000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: acbf51323d5bf2d622028806a70f659c486b8d1399a682ea5744b84d7eb30e96
                                • Instruction ID: 1f15ead3cb26dc5bb98b59f9b89b8e23517685bf28e787f313e88ae3aa4e1037
                                • Opcode Fuzzy Hash: acbf51323d5bf2d622028806a70f659c486b8d1399a682ea5744b84d7eb30e96
                                • Instruction Fuzzy Hash: 231110B6C002098FDB10CF9AC448BDEFBF4AF88324F14842AD829B7610C378A545CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 514 96812f9-968136a PostMessageW 515 968136c-9681372 514->515 516 9681373-9681387 514->516 515->516
                                APIs
                                • PostMessageW.USER32(?,?,?,?), ref: 0968135D
                                Memory Dump Source
                                • Source File: 00000000.00000002.269668825.0000000009680000.00000040.00000001.sdmp, Offset: 09680000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9680000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: a3b83c8135e95db89a8dfc005bde53c04c47710e26ca49dbb46077ee0e944795
                                • Instruction ID: 0263951321f64e06dbc0cc62639b79f4091414226275d4d8bcec1f725a071cf3
                                • Opcode Fuzzy Hash: a3b83c8135e95db89a8dfc005bde53c04c47710e26ca49dbb46077ee0e944795
                                • Instruction Fuzzy Hash: BF11F5B58002089FDB10DF99D489BDFBBF8EB49324F14851AE554A7610C374A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 518 9681300-968136a PostMessageW 519 968136c-9681372 518->519 520 9681373-9681387 518->520 519->520
                                APIs
                                • PostMessageW.USER32(?,?,?,?), ref: 0968135D
                                Memory Dump Source
                                • Source File: 00000000.00000002.269668825.0000000009680000.00000040.00000001.sdmp, Offset: 09680000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9680000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: c3e778d14f01e0dc622c305d3e188187a0d9e544cb37a54b1956f8be42254945
                                • Instruction ID: 8c30fe7a6d8c1413153e6b0338221a406f888d19906a2d1163b0118c5713e7db
                                • Opcode Fuzzy Hash: c3e778d14f01e0dc622c305d3e188187a0d9e544cb37a54b1956f8be42254945
                                • Instruction Fuzzy Hash: A91115B5800308DFDB10DF99C488BDFBBF8EB48324F14851AE554A3600C374A544CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.263610498.00000000014FD000.00000040.00000001.sdmp, Offset: 014FD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14fd000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2d8588b82b72683297204e4793755c73d784f2c2a4b9fc9b2ef96eb8cad5221e
                                • Instruction ID: dd2197e0900a3da5b8c9d6ba47e6a983c31704a8d4f5c316ea2834b449d25749
                                • Opcode Fuzzy Hash: 2d8588b82b72683297204e4793755c73d784f2c2a4b9fc9b2ef96eb8cad5221e
                                • Instruction Fuzzy Hash: 492106B1900244DFDB05DF94D9C4B67BF65FB88318F24896ED9050B366C336D846CBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.263610498.00000000014FD000.00000040.00000001.sdmp, Offset: 014FD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14fd000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 66e9ac3a3790651da00733cb07f983236c639fb6645b409be5ab0870de9227a5
                                • Instruction ID: 651ac205d0e78b2e8a762a0e3a14868a09506b21725f5e076f10170329d3e2f6
                                • Opcode Fuzzy Hash: 66e9ac3a3790651da00733cb07f983236c639fb6645b409be5ab0870de9227a5
                                • Instruction Fuzzy Hash: 6421F4B1900204DFDB05CF94D9C4B96BB65FB84324F24857EDA050B326C336E846CAA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.263629273.000000000150D000.00000040.00000001.sdmp, Offset: 0150D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_150d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7315b78c5d35c2b29d79f5e6c7f085f52a98ecf749c3805e2ea97edd3aeaed68
                                • Instruction ID: 781e6bb60144843c0dc01695cdaf6f7bb9ea70874ad03e3600c9da44aff568e5
                                • Opcode Fuzzy Hash: 7315b78c5d35c2b29d79f5e6c7f085f52a98ecf749c3805e2ea97edd3aeaed68
                                • Instruction Fuzzy Hash: 5621F571904305EFDB02DFD4D5C4B2ABBB5FB84324F24C969E8094F286C336D846CA61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.263629273.000000000150D000.00000040.00000001.sdmp, Offset: 0150D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_150d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7966ebbe48951310de9d96a739ebe9a23a2d9eaeb9e3b73b12c833586aed92fa
                                • Instruction ID: 1a619f5598a1cd4c9da8eb72049bdfc29dc7dd9d91187f317c8ca31208d4540d
                                • Opcode Fuzzy Hash: 7966ebbe48951310de9d96a739ebe9a23a2d9eaeb9e3b73b12c833586aed92fa
                                • Instruction Fuzzy Hash: 872100B1604204EFDB12CFD4D9D4B2ABBB5FB84364F24C969D80D4F286D33AD806CA61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.263629273.000000000150D000.00000040.00000001.sdmp, Offset: 0150D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_150d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a4bd34f8086c6c0d49b8b288acaab7c6944a7d6bb80afe722e622052681bf721
                                • Instruction ID: ba7b3f565970d2bbf7ac4835a3bbca10607661606c4306296c49369c092d720d
                                • Opcode Fuzzy Hash: a4bd34f8086c6c0d49b8b288acaab7c6944a7d6bb80afe722e622052681bf721
                                • Instruction Fuzzy Hash: 7D2192755093808FDB03CFA4D990B15BF71FB46214F28C5DAD8498F697C33A984ACB62
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.263610498.00000000014FD000.00000040.00000001.sdmp, Offset: 014FD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14fd000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b026a0720eb4c1b8d48423054a7afd16db820eb83f93aa31c1cd4e4ebf195fc9
                                • Instruction ID: cb7f4e22a7e316ba98cd23f945065c9bae885d5b1c55a75446e5ce054d65dbf4
                                • Opcode Fuzzy Hash: b026a0720eb4c1b8d48423054a7afd16db820eb83f93aa31c1cd4e4ebf195fc9
                                • Instruction Fuzzy Hash: 0D11A276804240DFDB12CF54D5C4B56BF71FB84324F2486AED9050B766C33AD456CBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.263610498.00000000014FD000.00000040.00000001.sdmp, Offset: 014FD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14fd000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b026a0720eb4c1b8d48423054a7afd16db820eb83f93aa31c1cd4e4ebf195fc9
                                • Instruction ID: 2913d89dcc19cbacf7caee6f2c1081e217d0ae6e4e444e4b585a4688d4741f04
                                • Opcode Fuzzy Hash: b026a0720eb4c1b8d48423054a7afd16db820eb83f93aa31c1cd4e4ebf195fc9
                                • Instruction Fuzzy Hash: 4311AF76804280CFDB12CF54D9C4B16BF71FB84324F2486AED9450B766C336D45ACBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.263629273.000000000150D000.00000040.00000001.sdmp, Offset: 0150D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_150d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8d4a615e5dd6ad9fc3a51053f329abe2d5799460873fcff9efeb80ce7cc17978
                                • Instruction ID: f90e82577e5ad9b27ba90d6c363332f2705cc9305dcf672f70ad5b0aa093d6dc
                                • Opcode Fuzzy Hash: 8d4a615e5dd6ad9fc3a51053f329abe2d5799460873fcff9efeb80ce7cc17978
                                • Instruction Fuzzy Hash: 1B118B75904280DFDB12CF98D5C4B19BBB1FB84224F28C6A9D8494F696C33AD45ACB61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.263610498.00000000014FD000.00000040.00000001.sdmp, Offset: 014FD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14fd000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 43b042a9abad52353aca1fd827505fe29f25a96d7ad264cd231b6c3f02683eaa
                                • Instruction ID: dba5174f1c45f0556c42f1fa17a7b1b430ba8047206a416840fee1d362b83e0c
                                • Opcode Fuzzy Hash: 43b042a9abad52353aca1fd827505fe29f25a96d7ad264cd231b6c3f02683eaa
                                • Instruction Fuzzy Hash: D001F7718043449AF7109E99CD847A3BFDCEF40674F18881FEE0C5A362D7789844CAB2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.263610498.00000000014FD000.00000040.00000001.sdmp, Offset: 014FD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_14fd000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d76c3b304501607a98b256267344e99f31abf44029c585150df4560c87d44153
                                • Instruction ID: ae457d99914541450877a84a89ee3808509405bc1f42ea529f1b3686dc9d75b3
                                • Opcode Fuzzy Hash: d76c3b304501607a98b256267344e99f31abf44029c585150df4560c87d44153
                                • Instruction Fuzzy Hash: C1F04F71804244AAF7118A59C984B63FF98EF41674F18855AEE085F792D278A844CAB1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Non-executed Functions

                                Memory Dump Source
                                • Source File: 00000000.00000002.264031877.0000000003110000.00000040.00000001.sdmp, Offset: 03110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3110000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f6629ec23cf7e70e66de6527325b500bc132e8cf122ec37f24c4fd7ae23aba14
                                • Instruction ID: aeaf3ff439926c3594e3eeb2b38f2e646f01ab2f2f348a2aabb211c3bdbcbb88
                                • Opcode Fuzzy Hash: f6629ec23cf7e70e66de6527325b500bc132e8cf122ec37f24c4fd7ae23aba14
                                • Instruction Fuzzy Hash: ADA16036E10219CFCF05DFA5D8845EEBBF2FF89300B1581BAE405AB261DB31A955CB80
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Execution Graph

                                Execution Coverage:12.7%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:137
                                Total number of Limit Nodes:7

                                Graph

                                execution_graph 17929 2b96758 17932 2b96344 17929->17932 17931 2b96766 17933 2b9634f 17932->17933 17936 2b96394 17933->17936 17935 2b9688d 17935->17931 17937 2b9639f 17936->17937 17940 2b963c4 17937->17940 17939 2b96962 17939->17935 17941 2b963cf 17940->17941 17944 2b963f4 17941->17944 17943 2b96a62 17943->17939 17945 2b963ff 17944->17945 17947 2b9717e 17945->17947 17950 2b992b9 17945->17950 17946 2b971bc 17946->17943 17947->17946 17954 2b9b406 17947->17954 17959 2b992e1 17950->17959 17962 2b992f0 17950->17962 17951 2b992ce 17951->17947 17955 2b9b429 17954->17955 17956 2b9b44d 17955->17956 17985 2b9b5a9 17955->17985 17989 2b9b5b8 17955->17989 17956->17946 17960 2b992ff 17959->17960 17965 2b993e8 17959->17965 17960->17951 17964 2b993e8 2 API calls 17962->17964 17963 2b992ff 17963->17951 17964->17963 17966 2b993fb 17965->17966 17967 2b99413 17966->17967 17973 2b99670 17966->17973 17977 2b99660 17966->17977 17967->17960 17968 2b9940b 17968->17967 17969 2b99610 GetModuleHandleW 17968->17969 17970 2b9963d 17969->17970 17970->17960 17974 2b99684 17973->17974 17975 2b996a9 17974->17975 17981 2b98768 17974->17981 17975->17968 17978 2b99670 17977->17978 17979 2b98768 LoadLibraryExW 17978->17979 17980 2b996a9 17978->17980 17979->17980 17980->17968 17982 2b99850 LoadLibraryExW 17981->17982 17984 2b998c9 17982->17984 17984->17975 17986 2b9b5c5 17985->17986 17987 2b9b5ff 17986->17987 17993 2b9a0ec 17986->17993 17987->17956 17990 2b9b5c5 17989->17990 17991 2b9b5ff 17990->17991 17992 2b9a0ec 6 API calls 17990->17992 17991->17956 17992->17991 17994 2b9a0f7 17993->17994 17996 2b9c2f8 17994->17996 17997 2b9b904 17994->17997 17996->17996 17998 2b9b90f 17997->17998 17999 2b963f4 6 API calls 17998->17999 18000 2b9c367 17999->18000 18009 2b9c3d3 18000->18009 18015 2b9c3e0 18000->18015 18001 2b9c375 18002 2b9b914 LoadLibraryExW GetModuleHandleW 18001->18002 18003 2b9c38f 18002->18003 18007 2b9e0d8 LoadLibraryExW GetModuleHandleW CreateWindowExW 18003->18007 18008 2b9e0f0 LoadLibraryExW GetModuleHandleW CreateWindowExW 18003->18008 18004 2b9c3a0 18004->17996 18007->18004 18008->18004 18010 2b9c40e 18009->18010 18012 2b9c437 18010->18012 18014 2b9c4df 18010->18014 18021 2b9b9a0 18010->18021 18013 2b9c4da KiUserCallbackDispatcher 18012->18013 18012->18014 18013->18014 18016 2b9c40e 18015->18016 18017 2b9b9a0 GetFocus 18016->18017 18018 2b9c437 18016->18018 18020 2b9c4df 18016->18020 18017->18018 18019 2b9c4da KiUserCallbackDispatcher 18018->18019 18018->18020 18019->18020 18022 2b9b9ab 18021->18022 18023 2b9ba14 GetFocus 18022->18023 18024 2b9c9f5 18022->18024 18023->18024 18024->18012 17900 66414a0 17901 66414ad 17900->17901 17902 66414b1 17900->17902 17906 664169e 17902->17906 17911 66416b8 17902->17911 17907 66416b8 17906->17907 17916 2b9edef 17907->17916 17920 2b9ee00 17907->17920 17912 66416c0 17911->17912 17914 2b9edef CreateWindowExW 17912->17914 17915 2b9ee00 CreateWindowExW 17912->17915 17913 66414d1 17914->17913 17915->17913 17917 2b9ee2a 17916->17917 17918 2b9eed1 17917->17918 17924 2b9faa0 17917->17924 17921 2b9ee2a 17920->17921 17922 2b9eed1 17921->17922 17923 2b9faa0 CreateWindowExW 17921->17923 17923->17922 17925 2b9fb8a 17924->17925 17926 2b9fbec CreateWindowExW 17924->17926 17925->17918 17928 2b9fd1c 17926->17928 17928->17928 18025 2b9b6d0 GetCurrentProcess 18026 2b9b74a GetCurrentThread 18025->18026 18027 2b9b743 18025->18027 18028 2b9b780 18026->18028 18029 2b9b787 GetCurrentProcess 18026->18029 18027->18026 18028->18029 18032 2b9b7bd 18029->18032 18030 2b9b7e5 GetCurrentThreadId 18031 2b9b816 18030->18031 18032->18030 18070 2b9bd00 DuplicateHandle 18071 2b9bd96 18070->18071 18072 2b9fe40 SetWindowLongW 18073 2b9feac 18072->18073 18033 6643208 18034 6643211 18033->18034 18038 6643248 18034->18038 18043 6643258 18034->18043 18035 6643242 18039 6643258 18038->18039 18048 6643280 18039->18048 18053 6643290 18039->18053 18040 6643274 18040->18035 18044 664325d 18043->18044 18046 6643280 DnsQuery_A 18044->18046 18047 6643290 DnsQuery_A 18044->18047 18045 6643274 18045->18035 18046->18045 18047->18045 18049 66432ae 18048->18049 18050 66432e5 18049->18050 18058 6643398 18049->18058 18062 6643389 18049->18062 18050->18040 18054 66432ae 18053->18054 18055 66432e5 18054->18055 18056 6643398 DnsQuery_A 18054->18056 18057 6643389 DnsQuery_A 18054->18057 18055->18040 18056->18055 18057->18055 18059 66433c1 18058->18059 18066 6641914 18059->18066 18063 66433c1 18062->18063 18064 6641914 DnsQuery_A 18063->18064 18065 6643402 18064->18065 18065->18050 18067 6643610 DnsQuery_A 18066->18067 18069 664374a 18067->18069

                                Executed Functions

                                Control-flow Graph

                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 02B9B730
                                • GetCurrentThread.KERNEL32 ref: 02B9B76D
                                • GetCurrentProcess.KERNEL32 ref: 02B9B7AA
                                • GetCurrentThreadId.KERNEL32 ref: 02B9B803
                                Memory Dump Source
                                • Source File: 00000001.00000002.518063446.0000000002B90000.00000040.00000001.sdmp, Offset: 02B90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_2b90000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID:
                                • API String ID: 2063062207-0
                                • Opcode ID: bb8bbf3ee78a203df350efeae28d100755352cbd9b3b257f7a9f54c52372d4fd
                                • Instruction ID: 7a360ea8202cc692876a4c8cdf37e698b56294a582950a29c4a1c470c1a7ae91
                                • Opcode Fuzzy Hash: bb8bbf3ee78a203df350efeae28d100755352cbd9b3b257f7a9f54c52372d4fd
                                • Instruction Fuzzy Hash: 275165B0D00348CFDB04CFA9D688BDEBBF0AF49308F2485AAE419A72A0D7345945CF65
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 02B9B730
                                • GetCurrentThread.KERNEL32 ref: 02B9B76D
                                • GetCurrentProcess.KERNEL32 ref: 02B9B7AA
                                • GetCurrentThreadId.KERNEL32 ref: 02B9B803
                                Memory Dump Source
                                • Source File: 00000001.00000002.518063446.0000000002B90000.00000040.00000001.sdmp, Offset: 02B90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_2b90000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID:
                                • API String ID: 2063062207-0
                                • Opcode ID: 72d8d7500a6fdead3edbab9bb390b5dc1123087f60f6749fb1362431fd4d9e4a
                                • Instruction ID: 0c901a7caa26ea03fcc8a3fa3f41734b7dcd32cff1c0c43c6e96c923f0d6a417
                                • Opcode Fuzzy Hash: 72d8d7500a6fdead3edbab9bb390b5dc1123087f60f6749fb1362431fd4d9e4a
                                • Instruction Fuzzy Hash: 7A5143B0D00648CFDB14CFA9D688BDEBBF1AF88318F2085A9E419A7360D7755844CF65
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 39 2b9faa0-2b9fb88 40 2b9fb8a-2b9fbd8 call 2b9da04 39->40 41 2b9fbec-2b9fc5e 39->41 45 2b9fbdd-2b9fbde 40->45 43 2b9fc69-2b9fc70 41->43 44 2b9fc60-2b9fc66 41->44 46 2b9fc7b-2b9fd1a CreateWindowExW 43->46 47 2b9fc72-2b9fc78 43->47 44->43 49 2b9fd1c-2b9fd22 46->49 50 2b9fd23-2b9fd5b 46->50 47->46 49->50 54 2b9fd68 50->54 55 2b9fd5d-2b9fd60 50->55 56 2b9fd69 54->56 55->54 56->56
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02B9FD0A
                                Memory Dump Source
                                • Source File: 00000001.00000002.518063446.0000000002B90000.00000040.00000001.sdmp, Offset: 02B90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_2b90000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: f3b665daa90edd2ab71750b7cc978d4cf48e56aee10ac19cf748412a027ff567
                                • Instruction ID: 1c618aafeab2322e7f852f99703a79dde3b4f9b93a33996e533a2ef5c533b212
                                • Opcode Fuzzy Hash: f3b665daa90edd2ab71750b7cc978d4cf48e56aee10ac19cf748412a027ff567
                                • Instruction Fuzzy Hash: D0913D718093899FDF02CFB8C8919D9BFB1AF4B314F5981EAE8849B162C7345859CF51
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 57 6643558-6643574 58 6643576-6643587 57->58 59 664358a-66435eb 57->59 68 66435c8-66435f7 59->68 69 66435f9-6643683 59->69 75 6643685-664368f 69->75 76 66436bc-66436ef 69->76 75->76 77 6643691-6643693 75->77 85 66436f7-6643748 DnsQuery_A 76->85 80 6643695-664369f 77->80 81 66436b6-66436b9 77->81 82 66436a1 80->82 83 66436a3-66436b2 80->83 81->76 82->83 83->83 84 66436b4 83->84 84->81 86 6643751-664379e 85->86 87 664374a-6643750 85->87 92 66437a0-66437a4 86->92 93 66437ae-66437b2 86->93 87->86 92->93 94 66437a6 92->94 95 66437b4-66437b7 93->95 96 66437c1-66437c5 93->96 94->93 95->96 97 66437d6 96->97 98 66437c7-66437d3 96->98 100 66437d7 97->100 98->97 100->100
                                Memory Dump Source
                                • Source File: 00000001.00000002.527840562.0000000006640000.00000040.00000001.sdmp, Offset: 06640000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_6640000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b2748652841213ead9aebac23bdb60c8f9ce89db4fe9ebe9c27017dfb9f1c549
                                • Instruction ID: 5b65f25b771de19cee37fb1a96fe7733dea978b40e72a80774db263d72a2d7cc
                                • Opcode Fuzzy Hash: b2748652841213ead9aebac23bdb60c8f9ce89db4fe9ebe9c27017dfb9f1c549
                                • Instruction Fuzzy Hash: 768166B1D04219CFDB54EFAAC9846DEBBB5BF48304F20852AD415BB350DB70A94ACF91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 101 2b993e8-2b993fd call 2b98704 104 2b993ff 101->104 105 2b99413-2b99417 101->105 156 2b99405 call 2b99670 104->156 157 2b99405 call 2b99660 104->157 106 2b99419-2b99423 105->106 107 2b9942b-2b9946c 105->107 106->107 112 2b99479-2b99487 107->112 113 2b9946e-2b99476 107->113 108 2b9940b-2b9940d 108->105 109 2b99548-2b99608 108->109 149 2b9960a-2b9960d 109->149 150 2b99610-2b9963b GetModuleHandleW 109->150 115 2b99489-2b9948e 112->115 116 2b994ab-2b994ad 112->116 113->112 118 2b99499 115->118 119 2b99490-2b99497 call 2b98710 115->119 117 2b994b0-2b994b7 116->117 122 2b994b9-2b994c1 117->122 123 2b994c4-2b994cb 117->123 121 2b9949b-2b994a9 118->121 119->121 121->117 122->123 126 2b994d8-2b994e1 call 2b98720 123->126 127 2b994cd-2b994d5 123->127 132 2b994ee-2b994f3 126->132 133 2b994e3-2b994eb 126->133 127->126 134 2b99511-2b99515 132->134 135 2b994f5-2b994fc 132->135 133->132 154 2b99518 call 2b99968 134->154 155 2b99518 call 2b99958 134->155 135->134 137 2b994fe-2b9950e call 2b98730 call 2b98740 135->137 137->134 139 2b9951b-2b9951e 142 2b99541-2b99547 139->142 143 2b99520-2b9953e 139->143 143->142 149->150 151 2b9963d-2b99643 150->151 152 2b99644-2b99658 150->152 151->152 154->139 155->139 156->108 157->108
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 02B9962E
                                Memory Dump Source
                                • Source File: 00000001.00000002.518063446.0000000002B90000.00000040.00000001.sdmp, Offset: 02B90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_2b90000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: f9fabd53d5b4f28fc7bbc59eab93fbc88c1b1795f5485683eb36ffe18151b8a8
                                • Instruction ID: 9e3889680746e7914b19be75177a37a53eb12f94d16adc8573a366dbfcc33584
                                • Opcode Fuzzy Hash: f9fabd53d5b4f28fc7bbc59eab93fbc88c1b1795f5485683eb36ffe18151b8a8
                                • Instruction Fuzzy Hash: 1B711070A00B058FDB64CF6AC0457AABBF5FB89214F048A6ED48AD7A50DB35E8458F91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 158 6641909-6643683 161 6643685-664368f 158->161 162 66436bc-66436ef 158->162 161->162 163 6643691-6643693 161->163 170 66436f7-6643748 DnsQuery_A 162->170 165 6643695-664369f 163->165 166 66436b6-66436b9 163->166 167 66436a1 165->167 168 66436a3-66436b2 165->168 166->162 167->168 168->168 169 66436b4 168->169 169->166 171 6643751-664379e 170->171 172 664374a-6643750 170->172 177 66437a0-66437a4 171->177 178 66437ae-66437b2 171->178 172->171 177->178 179 66437a6 177->179 180 66437b4-66437b7 178->180 181 66437c1-66437c5 178->181 179->178 180->181 182 66437d6 181->182 183 66437c7-66437d3 181->183 185 66437d7 182->185 183->182 185->185
                                APIs
                                • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06643738
                                Memory Dump Source
                                • Source File: 00000001.00000002.527840562.0000000006640000.00000040.00000001.sdmp, Offset: 06640000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_6640000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: Query_
                                • String ID:
                                • API String ID: 428220571-0
                                • Opcode ID: f8f41c50c78c5c02ecb7055e7368b7040ab3418205df8254b23d2817cfcf06f0
                                • Instruction ID: 5e568b09984719b10a8a29e0184b909a9d42b7ef9b2d5830143c90f8269fff21
                                • Opcode Fuzzy Hash: f8f41c50c78c5c02ecb7055e7368b7040ab3418205df8254b23d2817cfcf06f0
                                • Instruction Fuzzy Hash: 385123B0D042199FDB54DFAAC8846DDBBB5BF48314F24852AE815BB350DBB4A846CF80
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 186 6643604-6643683 188 6643685-664368f 186->188 189 66436bc-66436ef 186->189 188->189 190 6643691-6643693 188->190 197 66436f7-6643748 DnsQuery_A 189->197 192 6643695-664369f 190->192 193 66436b6-66436b9 190->193 194 66436a1 192->194 195 66436a3-66436b2 192->195 193->189 194->195 195->195 196 66436b4 195->196 196->193 198 6643751-664379e 197->198 199 664374a-6643750 197->199 204 66437a0-66437a4 198->204 205 66437ae-66437b2 198->205 199->198 204->205 206 66437a6 204->206 207 66437b4-66437b7 205->207 208 66437c1-66437c5 205->208 206->205 207->208 209 66437d6 208->209 210 66437c7-66437d3 208->210 212 66437d7 209->212 210->209 212->212
                                APIs
                                • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06643738
                                Memory Dump Source
                                • Source File: 00000001.00000002.527840562.0000000006640000.00000040.00000001.sdmp, Offset: 06640000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_6640000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: Query_
                                • String ID:
                                • API String ID: 428220571-0
                                • Opcode ID: b7fc95f32880f1de8189b1d72e0c36ab84f340e553ccf45492dc6059d70918fc
                                • Instruction ID: ca9545dcf02a81c059026006806a2d32bf90c6ca65d8f18996f08258eff1a698
                                • Opcode Fuzzy Hash: b7fc95f32880f1de8189b1d72e0c36ab84f340e553ccf45492dc6059d70918fc
                                • Instruction Fuzzy Hash: 115122B1D04219CFDB54DFAAC9846DEBBB5BF48304F24852AE815BB350DB70A846CF80
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 213 6641914-6643683 216 6643685-664368f 213->216 217 66436bc-6643748 DnsQuery_A 213->217 216->217 218 6643691-6643693 216->218 226 6643751-664379e 217->226 227 664374a-6643750 217->227 220 6643695-664369f 218->220 221 66436b6-66436b9 218->221 222 66436a1 220->222 223 66436a3-66436b2 220->223 221->217 222->223 223->223 224 66436b4 223->224 224->221 232 66437a0-66437a4 226->232 233 66437ae-66437b2 226->233 227->226 232->233 234 66437a6 232->234 235 66437b4-66437b7 233->235 236 66437c1-66437c5 233->236 234->233 235->236 237 66437d6 236->237 238 66437c7-66437d3 236->238 240 66437d7 237->240 238->237 240->240
                                APIs
                                • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06643738
                                Memory Dump Source
                                • Source File: 00000001.00000002.527840562.0000000006640000.00000040.00000001.sdmp, Offset: 06640000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_6640000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: Query_
                                • String ID:
                                • API String ID: 428220571-0
                                • Opcode ID: 8086761d2d84ce7a2ae2b2af75169f5f00e074e37ae38e8668815fb27af2c81e
                                • Instruction ID: 67c0ba83ea88dfcc8048ca022ebe44f669517df1e4dd3ad84f0cc0d8f5d16790
                                • Opcode Fuzzy Hash: 8086761d2d84ce7a2ae2b2af75169f5f00e074e37ae38e8668815fb27af2c81e
                                • Instruction Fuzzy Hash: DF5112B0D042199FDB54DFAAC8846DEBBB5BF48304F24842AE815BB350DB74A846CF80
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 241 2b9fbf8-2b9fc5e 242 2b9fc69-2b9fc70 241->242 243 2b9fc60-2b9fc66 241->243 244 2b9fc7b-2b9fcb3 242->244 245 2b9fc72-2b9fc78 242->245 243->242 246 2b9fcbb-2b9fd1a CreateWindowExW 244->246 245->244 247 2b9fd1c-2b9fd22 246->247 248 2b9fd23-2b9fd5b 246->248 247->248 252 2b9fd68 248->252 253 2b9fd5d-2b9fd60 248->253 254 2b9fd69 252->254 253->252 254->254
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02B9FD0A
                                Memory Dump Source
                                • Source File: 00000001.00000002.518063446.0000000002B90000.00000040.00000001.sdmp, Offset: 02B90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_2b90000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: b922c567c636e796dbb271475a66c653cbd7901685859fc52b21f6817ad87dcf
                                • Instruction ID: e3a95602a6bed69dfd01a72850c15bc5e97aec7b4eae0915c67c9bd85ff96b1b
                                • Opcode Fuzzy Hash: b922c567c636e796dbb271475a66c653cbd7901685859fc52b21f6817ad87dcf
                                • Instruction Fuzzy Hash: EF41CEB1D00309AFDF14CF99C984ADEBBB5FF88354F24816AE819AB250D7749945CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 255 2b9bcf9-2b9bcfe 256 2b9bd00-2b9bd94 DuplicateHandle 255->256 257 2b9bd9d-2b9bdba 256->257 258 2b9bd96-2b9bd9c 256->258 258->257
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02B9BD87
                                Memory Dump Source
                                • Source File: 00000001.00000002.518063446.0000000002B90000.00000040.00000001.sdmp, Offset: 02B90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_2b90000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: bbfe8463b54e1bd479bffcb8e573b07428f7dae61db7a93e5ecd99f9e79b0222
                                • Instruction ID: fe971c9835e6a3e57dfd983bc37e4a6fb9aed279543e500609fd36d25054b0cf
                                • Opcode Fuzzy Hash: bbfe8463b54e1bd479bffcb8e573b07428f7dae61db7a93e5ecd99f9e79b0222
                                • Instruction Fuzzy Hash: 7C2105B5D00208DFDB00CFA9D984ADEBBF8EF49324F14845AE914A3210D374A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 261 2b9bd00-2b9bd94 DuplicateHandle 262 2b9bd9d-2b9bdba 261->262 263 2b9bd96-2b9bd9c 261->263 263->262
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02B9BD87
                                Memory Dump Source
                                • Source File: 00000001.00000002.518063446.0000000002B90000.00000040.00000001.sdmp, Offset: 02B90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_2b90000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 0fa293da402240749f23603acc251b21da7a1393693c25b64f00161484248cf4
                                • Instruction ID: c23199bcea23a08cad0a70020d0200562d952da58ecefb1afd7b0a270995d665
                                • Opcode Fuzzy Hash: 0fa293da402240749f23603acc251b21da7a1393693c25b64f00161484248cf4
                                • Instruction Fuzzy Hash: EF21E3B5D002189FDB10CF99D984ADEBBF8EB48324F14846AE914A3250D374A944CFA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 266 2b99849-2b99890 268 2b99898-2b998c7 LoadLibraryExW 266->268 269 2b99892-2b99895 266->269 270 2b998c9-2b998cf 268->270 271 2b998d0-2b998ed 268->271 269->268 270->271
                                APIs
                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02B996A9,00000800,00000000,00000000), ref: 02B998BA
                                Memory Dump Source
                                • Source File: 00000001.00000002.518063446.0000000002B90000.00000040.00000001.sdmp, Offset: 02B90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_2b90000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: 1536f89cf0646cc21d2c9412096862239b637f971d51bea819644e0789abc907
                                • Instruction ID: f2d1bd932aceca237ac3c6e2f377bf3bc7b53824c69ee56aa7163ffb17051d12
                                • Opcode Fuzzy Hash: 1536f89cf0646cc21d2c9412096862239b637f971d51bea819644e0789abc907
                                • Instruction Fuzzy Hash: 312133B2D00249DFDB10CFAAD488ADEFBF4EB89354F14846ED425A7600C374A945CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 274 2b98768-2b99890 276 2b99898-2b998c7 LoadLibraryExW 274->276 277 2b99892-2b99895 274->277 278 2b998c9-2b998cf 276->278 279 2b998d0-2b998ed 276->279 277->276 278->279
                                APIs
                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02B996A9,00000800,00000000,00000000), ref: 02B998BA
                                Memory Dump Source
                                • Source File: 00000001.00000002.518063446.0000000002B90000.00000040.00000001.sdmp, Offset: 02B90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_2b90000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: bb3cffb715bd55a8394b8b187232895f5156e795e9e9d1a1475972a438560e96
                                • Instruction ID: 9cf7bfb077f0660dc2576a878c768a7d96ad224e83441115fcae9514e419602d
                                • Opcode Fuzzy Hash: bb3cffb715bd55a8394b8b187232895f5156e795e9e9d1a1475972a438560e96
                                • Instruction Fuzzy Hash: 751133B2D002098FDB10CF9AC488BDEFBF4EB88354F14846EE415A7200C375A945CFA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 282 2b9fe38-2b9feaa SetWindowLongW 283 2b9feac-2b9feb2 282->283 284 2b9feb3-2b9fec7 282->284 283->284
                                APIs
                                • SetWindowLongW.USER32(?,?,?), ref: 02B9FE9D
                                Memory Dump Source
                                • Source File: 00000001.00000002.518063446.0000000002B90000.00000040.00000001.sdmp, Offset: 02B90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_2b90000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: LongWindow
                                • String ID:
                                • API String ID: 1378638983-0
                                • Opcode ID: 8ee7c2c1f2a6da7a701b42536373c3a73f0c644445697a92fa6564c6c890eef6
                                • Instruction ID: 5abf6afa3a29fd2cd14d025d5e84c9d6f9f63096035b756e5eeaaa265b68692b
                                • Opcode Fuzzy Hash: 8ee7c2c1f2a6da7a701b42536373c3a73f0c644445697a92fa6564c6c890eef6
                                • Instruction Fuzzy Hash: A51155B1D00648CFDB10CF99D585BEEBBF8EB88324F24845AD854B3641C374A945CFA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 286 2b995c8-2b99608 287 2b9960a-2b9960d 286->287 288 2b99610-2b9963b GetModuleHandleW 286->288 287->288 289 2b9963d-2b99643 288->289 290 2b99644-2b99658 288->290 289->290
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 02B9962E
                                Memory Dump Source
                                • Source File: 00000001.00000002.518063446.0000000002B90000.00000040.00000001.sdmp, Offset: 02B90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_2b90000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: e0251b98903fb1b5d7bfc67582879254a14269483aaef2bb76ee26f7c9da42ee
                                • Instruction ID: 57775e2afb8d790c07d68498a8af6c727368bc14fef70887d6044580438e14eb
                                • Opcode Fuzzy Hash: e0251b98903fb1b5d7bfc67582879254a14269483aaef2bb76ee26f7c9da42ee
                                • Instruction Fuzzy Hash: A81122B2C006498FDB10CF9AC444BDEFBF4EF88328F14846AD829A7210C374A546CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • SetWindowLongW.USER32(?,?,?), ref: 02B9FE9D
                                Memory Dump Source
                                • Source File: 00000001.00000002.518063446.0000000002B90000.00000040.00000001.sdmp, Offset: 02B90000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_2b90000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: LongWindow
                                • String ID:
                                • API String ID: 1378638983-0
                                • Opcode ID: 248614d656e353dcc6226044266f3163a04d26f9ff02dd00f0dc8b5ca0aad37e
                                • Instruction ID: 958b55f555d72ed5c356cede0aa7e9876846c184ff68f870a74fe416a53f5eb4
                                • Opcode Fuzzy Hash: 248614d656e353dcc6226044266f3163a04d26f9ff02dd00f0dc8b5ca0aad37e
                                • Instruction Fuzzy Hash: 401115B5C006089FDB10CF99D589BDFBBF8EB48324F10845AD818A3741C374A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000001.00000002.515650266.0000000000EFD000.00000040.00000001.sdmp, Offset: 00EFD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_efd000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 65cfbff15d37033b86a9c24ac10b27f74bbc878d7c6eda33787f307c2a36f5ef
                                • Instruction ID: e201057ecacc586edffebb0b2f002a9c438ed12dae7a979f13e5af3162bff016
                                • Opcode Fuzzy Hash: 65cfbff15d37033b86a9c24ac10b27f74bbc878d7c6eda33787f307c2a36f5ef
                                • Instruction Fuzzy Hash: 0E2128B1508248DFDB01DF54DDC0B76BF66FB94328F24C569DA091B256C336D845CBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000001.00000002.515752321.0000000000F0D000.00000040.00000001.sdmp, Offset: 00F0D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_f0d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 20eda83b2ced2434c9fc8934b448a8bec53321fc773f04551484a3cfa904c5d4
                                • Instruction ID: d88bc5adadc1cbe188dce271c72bb9661b48c219d5980dfab29cf2059e53af3d
                                • Opcode Fuzzy Hash: 20eda83b2ced2434c9fc8934b448a8bec53321fc773f04551484a3cfa904c5d4
                                • Instruction Fuzzy Hash: 6F21F571A04244DFDB14CF94D9C4B16BB65FB84324F24C969D84D4B28AC336D847EA61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000001.00000002.515752321.0000000000F0D000.00000040.00000001.sdmp, Offset: 00F0D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_f0d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d5e9fb2fca49ccc5d0715b678e87bd757b358525b55dfcb69bfc26376932e2fd
                                • Instruction ID: 3ee7d626d71c03a7b820a6a9e3852cb55c5eb01dcbb5414c6b4a0f6503c68394
                                • Opcode Fuzzy Hash: d5e9fb2fca49ccc5d0715b678e87bd757b358525b55dfcb69bfc26376932e2fd
                                • Instruction Fuzzy Hash: 312180755093C08FDB02CF24D990715BF71EB46324F28C5EAD8498B697C33A980ADB62
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000001.00000002.515650266.0000000000EFD000.00000040.00000001.sdmp, Offset: 00EFD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_efd000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b026a0720eb4c1b8d48423054a7afd16db820eb83f93aa31c1cd4e4ebf195fc9
                                • Instruction ID: 7c37be359ad1214b2d3017d9bcd68c27fc56c03329aaf958451647f844f0cd23
                                • Opcode Fuzzy Hash: b026a0720eb4c1b8d48423054a7afd16db820eb83f93aa31c1cd4e4ebf195fc9
                                • Instruction Fuzzy Hash: C811E976804244CFDF12CF14D9C4B26BF72FB84328F24C5A9D9051B656C336D856CB91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Non-executed Functions

                                Execution Graph

                                Execution Coverage:10.2%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:108
                                Total number of Limit Nodes:9

                                Graph

                                execution_graph 16393 71b1138 16394 71b12f8 16393->16394 16395 71b115e 16393->16395 16396 71b12c3 16395->16396 16399 71b13b8 PostMessageW 16395->16399 16401 71b13b0 PostMessageW 16395->16401 16400 71b1424 16399->16400 16400->16395 16402 71b1424 16401->16402 16402->16395 16288 15c40d0 16289 15c40e7 16288->16289 16290 15c40f3 16289->16290 16294 15c41f0 16289->16294 16299 15c3870 16290->16299 16292 15c411e 16295 15c4215 16294->16295 16303 15c42f0 16295->16303 16307 15c42e1 16295->16307 16300 15c387b 16299->16300 16315 15c5684 16300->16315 16302 15c6ab6 16302->16292 16305 15c4317 16303->16305 16304 15c43f4 16304->16304 16305->16304 16311 15c3e6c 16305->16311 16308 15c4317 16307->16308 16309 15c3e6c CreateActCtxA 16308->16309 16310 15c43f4 16308->16310 16309->16310 16312 15c5380 CreateActCtxA 16311->16312 16314 15c5443 16312->16314 16314->16314 16316 15c568f 16315->16316 16319 15c56a4 16316->16319 16318 15c6b85 16318->16302 16320 15c56af 16319->16320 16323 15c56d4 16320->16323 16322 15c6c62 16322->16318 16324 15c56df 16323->16324 16327 15c5704 16324->16327 16326 15c6d62 16326->16322 16328 15c570f 16327->16328 16329 15c74bc 16328->16329 16332 15cb508 16328->16332 16337 15cb4f8 16328->16337 16329->16326 16333 15cb529 16332->16333 16336 15cb54d 16333->16336 16342 15cb6b8 16333->16342 16346 15cb6a9 16333->16346 16336->16329 16338 15cb529 16337->16338 16339 15cb54d 16338->16339 16340 15cb6b8 3 API calls 16338->16340 16341 15cb6a9 3 API calls 16338->16341 16339->16329 16340->16339 16341->16339 16343 15cb6c5 16342->16343 16344 15cb6ff 16343->16344 16350 15ca19c 16343->16350 16344->16336 16347 15cb6c5 16346->16347 16348 15cb6ff 16347->16348 16349 15ca19c 3 API calls 16347->16349 16348->16336 16349->16348 16351 15ca1a7 16350->16351 16353 15cc3f8 16351->16353 16354 15cbfb8 16351->16354 16353->16353 16355 15cbfc3 16354->16355 16356 15c5704 3 API calls 16355->16356 16357 15cc467 16355->16357 16356->16357 16358 15cc4a0 16357->16358 16361 15ce1e8 16357->16361 16370 15ce1d0 16357->16370 16358->16353 16363 15ce219 16361->16363 16364 15ce30a 16361->16364 16362 15ce225 16362->16358 16363->16362 16368 15ce668 LoadLibraryExW GetModuleHandleW 16363->16368 16369 15ce660 LoadLibraryExW GetModuleHandleW 16363->16369 16364->16358 16365 15ce265 16366 15cf030 CreateWindowExW 16365->16366 16367 15cf020 CreateWindowExW 16365->16367 16366->16364 16367->16364 16368->16365 16369->16365 16372 15ce219 16370->16372 16373 15ce30a 16370->16373 16371 15ce225 16371->16358 16372->16371 16377 15ce668 LoadLibraryExW GetModuleHandleW 16372->16377 16378 15ce660 LoadLibraryExW GetModuleHandleW 16372->16378 16373->16358 16374 15ce265 16375 15cf030 CreateWindowExW 16374->16375 16376 15cf020 CreateWindowExW 16374->16376 16375->16373 16376->16373 16377->16374 16378->16374 16379 15cb7d0 16380 15cb836 16379->16380 16384 15cb990 16380->16384 16387 15cb982 16380->16387 16381 15cb8e5 16390 15ca224 16384->16390 16388 15ca224 DuplicateHandle 16387->16388 16389 15cb9be 16387->16389 16388->16389 16389->16381 16391 15cb9f8 DuplicateHandle 16390->16391 16392 15cb9be 16391->16392 16392->16381 16403 15c93f0 16404 15c93ff 16403->16404 16406 15c94e8 16403->16406 16407 15c94fb 16406->16407 16408 15c9513 16407->16408 16414 15c9770 16407->16414 16418 15c9762 16407->16418 16408->16404 16409 15c950b 16409->16408 16410 15c9710 GetModuleHandleW 16409->16410 16411 15c973d 16410->16411 16411->16404 16415 15c9784 16414->16415 16417 15c97a9 16415->16417 16422 15c8818 16415->16422 16417->16409 16420 15c9784 16418->16420 16419 15c97a9 16419->16409 16420->16419 16421 15c8818 LoadLibraryExW 16420->16421 16421->16419 16423 15c9950 LoadLibraryExW 16422->16423 16425 15c99c9 16423->16425 16425->16417

                                Executed Functions

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 293 15c94e8-15c94fd call 15c71d4 296 15c94ff 293->296 297 15c9513-15c9517 293->297 346 15c9505 call 15c9770 296->346 347 15c9505 call 15c9762 296->347 298 15c9519-15c9523 297->298 299 15c952b-15c956c 297->299 298->299 304 15c956e-15c9576 299->304 305 15c9579-15c9587 299->305 300 15c950b-15c950d 300->297 302 15c9648-15c9708 300->302 341 15c970a-15c970d 302->341 342 15c9710-15c973b GetModuleHandleW 302->342 304->305 307 15c9589-15c958e 305->307 308 15c95ab-15c95ad 305->308 309 15c9599 307->309 310 15c9590-15c9597 call 15c87bc 307->310 311 15c95b0-15c95b7 308->311 314 15c959b-15c95a9 309->314 310->314 315 15c95b9-15c95c1 311->315 316 15c95c4-15c95cb 311->316 314->311 315->316 318 15c95cd-15c95d5 316->318 319 15c95d8-15c95e1 call 15c87cc 316->319 318->319 323 15c95ee-15c95f3 319->323 324 15c95e3-15c95eb 319->324 326 15c95f5-15c95fc 323->326 327 15c9611-15c961e 323->327 324->323 326->327 328 15c95fe-15c960e call 15c87dc call 15c87ec 326->328 334 15c9620-15c963e 327->334 335 15c9641-15c9647 327->335 328->327 334->335 341->342 343 15c973d-15c9743 342->343 344 15c9744-15c9758 342->344 343->344 346->300 347->300
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000), ref: 015C972E
                                Memory Dump Source
                                • Source File: 00000008.00000002.299981345.00000000015C0000.00000040.00000001.sdmp, Offset: 015C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_15c0000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 21d0a8b1469e3f6442c570909f826870af96c1338f56e086c4fdae6dc1ec2ddf
                                • Instruction ID: 173509f68ba6d40985e6f6bc66127f0d880e51cb58c8a78e851bb07fe973ba18
                                • Opcode Fuzzy Hash: 21d0a8b1469e3f6442c570909f826870af96c1338f56e086c4fdae6dc1ec2ddf
                                • Instruction Fuzzy Hash: DC7104B0A00B058FDB24DFA9D14479ABBF5BF88708F10892DD48ADBA50DB75E845CF91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 348 15cdd34-15cfe9e 350 15cfea9-15cfeb0 348->350 351 15cfea0-15cfea6 348->351 352 15cfebb-15cff5a CreateWindowExW 350->352 353 15cfeb2-15cfeb8 350->353 351->350 355 15cff5c-15cff62 352->355 356 15cff63-15cff9b 352->356 353->352 355->356 360 15cff9d-15cffa0 356->360 361 15cffa8 356->361 360->361 362 15cffa9 361->362 362->362
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 015CFF4A
                                Memory Dump Source
                                • Source File: 00000008.00000002.299981345.00000000015C0000.00000040.00000001.sdmp, Offset: 015C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_15c0000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: 447f0878b9339ab2acd8bed035528cb2dd6a2edd97ca0e6ad38376d62813cf0a
                                • Instruction ID: 8454055e4e57f663b8a63f426a8020eb81cd007daedee2aa3e5c0fb045a2b60b
                                • Opcode Fuzzy Hash: 447f0878b9339ab2acd8bed035528cb2dd6a2edd97ca0e6ad38376d62813cf0a
                                • Instruction Fuzzy Hash: 5851CFB1D003099FDB14CF99C884ADEBBB6FF48714F24852AE819AB250D7B09845CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 363 15cfe2e-15cfe9e 364 15cfea9-15cfeb0 363->364 365 15cfea0-15cfea6 363->365 366 15cfebb-15cfef3 364->366 367 15cfeb2-15cfeb8 364->367 365->364 368 15cfefb-15cff5a CreateWindowExW 366->368 367->366 369 15cff5c-15cff62 368->369 370 15cff63-15cff9b 368->370 369->370 374 15cff9d-15cffa0 370->374 375 15cffa8 370->375 374->375 376 15cffa9 375->376 376->376
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 015CFF4A
                                Memory Dump Source
                                • Source File: 00000008.00000002.299981345.00000000015C0000.00000040.00000001.sdmp, Offset: 015C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_15c0000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: 2d59224b56ec642f07af034c6207321ee7d90bce406fff3a3dfd498a6abb80d3
                                • Instruction ID: 3d9e77e7647ec22e6c83a316f31363e22063146fe472d24da2cd19da729d9ef7
                                • Opcode Fuzzy Hash: 2d59224b56ec642f07af034c6207321ee7d90bce406fff3a3dfd498a6abb80d3
                                • Instruction Fuzzy Hash: D751DEB1D003099FDB14CFD9C984ADEBBB6FF48714F24862AE819AB250D7B49845CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 377 15c5374-15c5441 CreateActCtxA 379 15c544a-15c54a4 377->379 380 15c5443-15c5449 377->380 387 15c54a6-15c54a9 379->387 388 15c54b3-15c54b7 379->388 380->379 387->388 389 15c54c8 388->389 390 15c54b9-15c54c5 388->390 391 15c54c9 389->391 390->389 391->391
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 015C5431
                                Memory Dump Source
                                • Source File: 00000008.00000002.299981345.00000000015C0000.00000040.00000001.sdmp, Offset: 015C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_15c0000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 7f9a0976404449191f15c905f1005f6653d22cbe5595af75d494e9c1399fca08
                                • Instruction ID: 5c53b357e1020a4190f20e990cbbc56e810b19a536fa1ac4e15806a412bc96fd
                                • Opcode Fuzzy Hash: 7f9a0976404449191f15c905f1005f6653d22cbe5595af75d494e9c1399fca08
                                • Instruction Fuzzy Hash: 3541F1B1D00619CFDB64CFE9C9847DDBBB5BF49304F20846AD408AB251DBB1694ACF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 393 15c3e6c-15c5441 CreateActCtxA 396 15c544a-15c54a4 393->396 397 15c5443-15c5449 393->397 404 15c54a6-15c54a9 396->404 405 15c54b3-15c54b7 396->405 397->396 404->405 406 15c54c8 405->406 407 15c54b9-15c54c5 405->407 408 15c54c9 406->408 407->406 408->408
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 015C5431
                                Memory Dump Source
                                • Source File: 00000008.00000002.299981345.00000000015C0000.00000040.00000001.sdmp, Offset: 015C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_15c0000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 6e764906d4df8d547c1cfed8531a2f4da1a7daaf199e50baade1d6cc215794b1
                                • Instruction ID: 6900b06945ddd781397de962780946052ad5c642d26acfe446ae5c4721e5b68d
                                • Opcode Fuzzy Hash: 6e764906d4df8d547c1cfed8531a2f4da1a7daaf199e50baade1d6cc215794b1
                                • Instruction Fuzzy Hash: 8241E070D00618CFDB64DFEAC9847DEBBB9BF48704F20846AD409AB251EBB56945CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 410 15ca224-15cba8c DuplicateHandle 412 15cba8e-15cba94 410->412 413 15cba95-15cbab2 410->413 412->413
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,015CB9BE,?,?,?,?,?), ref: 015CBA7F
                                Memory Dump Source
                                • Source File: 00000008.00000002.299981345.00000000015C0000.00000040.00000001.sdmp, Offset: 015C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_15c0000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: ed3b49032dc152fd3d6d32a4afc07fcac05b6afcb19a21114746089125a68dcb
                                • Instruction ID: e2ecd562b8bf158e13e42c3995635554ad18f911b78300d8e26a3f8e2c149898
                                • Opcode Fuzzy Hash: ed3b49032dc152fd3d6d32a4afc07fcac05b6afcb19a21114746089125a68dcb
                                • Instruction Fuzzy Hash: AF2114B5D00209EFDB10CF9AD984AEEBBF8FB48320F14841AE914A7310D374A944CFA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 416 15cb9f0-15cba8c DuplicateHandle 417 15cba8e-15cba94 416->417 418 15cba95-15cbab2 416->418 417->418
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,015CB9BE,?,?,?,?,?), ref: 015CBA7F
                                Memory Dump Source
                                • Source File: 00000008.00000002.299981345.00000000015C0000.00000040.00000001.sdmp, Offset: 015C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_15c0000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 5a5846cc4b623f72cf410a18afb550bcecb04d4c55e3a8f45708043f95154145
                                • Instruction ID: a1ebdb908c8bbc980966ec28f12e0f56807ef853fd67ff5f2b4faf4415e42e78
                                • Opcode Fuzzy Hash: 5a5846cc4b623f72cf410a18afb550bcecb04d4c55e3a8f45708043f95154145
                                • Instruction Fuzzy Hash: 5921E3B5D00209DFDB00CFA9D985ADEBBF8FB48324F14841AE954A7350D378A944CFA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 421 15c8818-15c9990 423 15c9998-15c99c7 LoadLibraryExW 421->423 424 15c9992-15c9995 421->424 425 15c99c9-15c99cf 423->425 426 15c99d0-15c99ed 423->426 424->423 425->426
                                APIs
                                • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,015C97A9,00000800,00000000,00000000), ref: 015C99BA
                                Memory Dump Source
                                • Source File: 00000008.00000002.299981345.00000000015C0000.00000040.00000001.sdmp, Offset: 015C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_15c0000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: b4a5c52280d1a4c8f8f3cdbb37ce37df41b0e0f04e16119b5ed2169aded70898
                                • Instruction ID: 616325026f93781a2084edb632d66ccc4ffb6b17d92d6ff2b297cb7ef31c107e
                                • Opcode Fuzzy Hash: b4a5c52280d1a4c8f8f3cdbb37ce37df41b0e0f04e16119b5ed2169aded70898
                                • Instruction Fuzzy Hash: ED1106B6900209DFDB10CF9AC444ADEBBF8FB48714F14842ED915A7610D3B4A545CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 429 15c994a-15c9990 430 15c9998-15c99c7 LoadLibraryExW 429->430 431 15c9992-15c9995 429->431 432 15c99c9-15c99cf 430->432 433 15c99d0-15c99ed 430->433 431->430 432->433
                                APIs
                                • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,015C97A9,00000800,00000000,00000000), ref: 015C99BA
                                Memory Dump Source
                                • Source File: 00000008.00000002.299981345.00000000015C0000.00000040.00000001.sdmp, Offset: 015C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_15c0000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: 663405749b33e30320a6e4e3d76f207e0cb188dfafd24daffa0af07eb1eb51de
                                • Instruction ID: 38279377740822be6f758496d928e7e3c975c0bdb70f13d86e29bad16313fafc
                                • Opcode Fuzzy Hash: 663405749b33e30320a6e4e3d76f207e0cb188dfafd24daffa0af07eb1eb51de
                                • Instruction Fuzzy Hash: FC1114B6C0020ACFDB10CF9AD544BDEBBF4BB48714F14841ED859A7610D378A545CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 436 71b13b0-71b1422 PostMessageW 437 71b142b-71b143f 436->437 438 71b1424-71b142a 436->438 438->437
                                APIs
                                • PostMessageW.USER32(?,?,?,?), ref: 071B1415
                                Memory Dump Source
                                • Source File: 00000008.00000002.306094006.00000000071B0000.00000040.00000001.sdmp, Offset: 071B0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_71b0000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: 0c3c980ec6bd5f55c83cf450234faadc54e8c1cb3d984843a3d60f9183f5391c
                                • Instruction ID: e93f4c3c4870edaac8e4348a1fc90d1be6b15c93e1b2c2d8a26d30185c4499f8
                                • Opcode Fuzzy Hash: 0c3c980ec6bd5f55c83cf450234faadc54e8c1cb3d984843a3d60f9183f5391c
                                • Instruction Fuzzy Hash: 711125B58002489FDB10CF99D885BEEBFF8EB48324F10851AE955A7650D3B46544CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 440 15c96c8-15c9708 441 15c970a-15c970d 440->441 442 15c9710-15c973b GetModuleHandleW 440->442 441->442 443 15c973d-15c9743 442->443 444 15c9744-15c9758 442->444 443->444
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000), ref: 015C972E
                                Memory Dump Source
                                • Source File: 00000008.00000002.299981345.00000000015C0000.00000040.00000001.sdmp, Offset: 015C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_15c0000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 0f787390861b0a5b3cfe637d17969a240a91f9df5e3b2b734f9afa21437c787e
                                • Instruction ID: 399985d75d61157260812db6726b82955d5daa98058fd2abf975c80f33010e83
                                • Opcode Fuzzy Hash: 0f787390861b0a5b3cfe637d17969a240a91f9df5e3b2b734f9afa21437c787e
                                • Instruction Fuzzy Hash: 9C110FB5C006098FDB10CF9AC448ADEFBF8FB89728F14842AD819A7210D374A545CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 446 71b13b8-71b1422 PostMessageW 447 71b142b-71b143f 446->447 448 71b1424-71b142a 446->448 448->447
                                APIs
                                • PostMessageW.USER32(?,?,?,?), ref: 071B1415
                                Memory Dump Source
                                • Source File: 00000008.00000002.306094006.00000000071B0000.00000040.00000001.sdmp, Offset: 071B0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_71b0000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: c84d85059537299c92464a08d33aa51a32f28add861d5a563bf42a5f46602598
                                • Instruction ID: 317b0dd57a85edd8cb948fc8e3898d1fb24cc2984f4e135590d5adc8dd94dd64
                                • Opcode Fuzzy Hash: c84d85059537299c92464a08d33aa51a32f28add861d5a563bf42a5f46602598
                                • Instruction Fuzzy Hash: 5A1115B58003499FDB10CF9AC584BDEBFF8FB48324F10841AE914A7240D3B4A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.299431618.000000000117D000.00000040.00000001.sdmp, Offset: 0117D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_117d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3829207a2673e728b78f4cdbf46a5346f35ce743449df9117655a98f256c3335
                                • Instruction ID: 37251c1a2f691fcad45aa1298b51f3ac145786fe494c289ff8db20a02fd4b82f
                                • Opcode Fuzzy Hash: 3829207a2673e728b78f4cdbf46a5346f35ce743449df9117655a98f256c3335
                                • Instruction Fuzzy Hash: 6321F4B2504208DFDF09CF94E9C4B96BB75FF84324F248569D8060B706C336E846CBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.299431618.000000000117D000.00000040.00000001.sdmp, Offset: 0117D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_117d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 34905d9fb9ae5c87807d6a81fca3dad6e81ba8ce99c1bd7c329739f66ea6cfe7
                                • Instruction ID: 10fb620382702dbf78b35157eaaadb659509d94df48ceeddbcf85be1790f5369
                                • Opcode Fuzzy Hash: 34905d9fb9ae5c87807d6a81fca3dad6e81ba8ce99c1bd7c329739f66ea6cfe7
                                • Instruction Fuzzy Hash: 2321F1B1500248DFDF09DF94E9C4B66BF75FF88328F248969E8051A306C336D846CBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.299480940.000000000118D000.00000040.00000001.sdmp, Offset: 0118D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_118d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 199f16b90308777f60c3c5009d4c74dc6ce70a432005362d7e20b4b5a08487a2
                                • Instruction ID: ce437b25c6e8bd10e27969259e19db8923f98e8d56ee1722f5ffbc5427ae375c
                                • Opcode Fuzzy Hash: 199f16b90308777f60c3c5009d4c74dc6ce70a432005362d7e20b4b5a08487a2
                                • Instruction Fuzzy Hash: 36210071504304EFDF19EF94E9C4B26BB65EB84264F24C969D8094B286C336D807CA62
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.299480940.000000000118D000.00000040.00000001.sdmp, Offset: 0118D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_118d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6e8fd73932d9a6cf3eca11932a21fd24cffcd135243903d869c4d577eb580452
                                • Instruction ID: ad7dc797e79f6e9c95274842e99e094a129e25ed79d65b6b7b1e7afd2e222815
                                • Opcode Fuzzy Hash: 6e8fd73932d9a6cf3eca11932a21fd24cffcd135243903d869c4d577eb580452
                                • Instruction Fuzzy Hash: 1621F571904304EFDF09EF94E5C4B26BB66FB84324F24C969E8094B282C336D846CF62
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.299431618.000000000117D000.00000040.00000001.sdmp, Offset: 0117D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_117d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b026a0720eb4c1b8d48423054a7afd16db820eb83f93aa31c1cd4e4ebf195fc9
                                • Instruction ID: c626a01db1f5074dcfc5ca5002d7eba44159f75a6cdf8f5e7f31882bb2025abb
                                • Opcode Fuzzy Hash: b026a0720eb4c1b8d48423054a7afd16db820eb83f93aa31c1cd4e4ebf195fc9
                                • Instruction Fuzzy Hash: B2119D76404284DFDF16CF54E5C4B56BF71FB84224F2486A9D8090AB56C33AE45ACBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.299431618.000000000117D000.00000040.00000001.sdmp, Offset: 0117D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_117d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b026a0720eb4c1b8d48423054a7afd16db820eb83f93aa31c1cd4e4ebf195fc9
                                • Instruction ID: 3c22666f41012f6e39487f0d26588065cb7c0f96ff2d9c39670e56d5280c9a65
                                • Opcode Fuzzy Hash: b026a0720eb4c1b8d48423054a7afd16db820eb83f93aa31c1cd4e4ebf195fc9
                                • Instruction Fuzzy Hash: 92119A76804284CFDF16CF54E9C4B16BF71FB88324F2886A9D8450B656C33AD45ACBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.299480940.000000000118D000.00000040.00000001.sdmp, Offset: 0118D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_118d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8d4a615e5dd6ad9fc3a51053f329abe2d5799460873fcff9efeb80ce7cc17978
                                • Instruction ID: ecd785826ee4aac0d4352a63cfc4785c7afb56b1175616e36b56efc7f0a0fec4
                                • Opcode Fuzzy Hash: 8d4a615e5dd6ad9fc3a51053f329abe2d5799460873fcff9efeb80ce7cc17978
                                • Instruction Fuzzy Hash: 0311BB75904280DFDF06DF54E5C0B15BBB2FB84324F28C6A9D8494B696C33AD44ACF62
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.299480940.000000000118D000.00000040.00000001.sdmp, Offset: 0118D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_118d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8d4a615e5dd6ad9fc3a51053f329abe2d5799460873fcff9efeb80ce7cc17978
                                • Instruction ID: d9153dd346e2b76bc4360b816735afb94f4bd44554c8ad5f630977d0b9251f08
                                • Opcode Fuzzy Hash: 8d4a615e5dd6ad9fc3a51053f329abe2d5799460873fcff9efeb80ce7cc17978
                                • Instruction Fuzzy Hash: 2311BB75504380CFDB16DF54E5C4B15BBA1FB84324F28C6AAD8494B696C33AD44BCFA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.299431618.000000000117D000.00000040.00000001.sdmp, Offset: 0117D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_117d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ec7e157a4453d1637585f0c5629802e419b900f3cc60c2c4633774ccc462f2a7
                                • Instruction ID: b502ea62002fc5dfe91883605a556a2cf81fad526255dc0a883b8bb24aeab5fe
                                • Opcode Fuzzy Hash: ec7e157a4453d1637585f0c5629802e419b900f3cc60c2c4633774ccc462f2a7
                                • Instruction Fuzzy Hash: 6301FC714043489AEB149E95DD847A7BFECEF40234F188419FD4C1E342D3789844C6B2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.299431618.000000000117D000.00000040.00000001.sdmp, Offset: 0117D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_117d000_INFORMATION CONFIRMATION LIST.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0aa1542d8d639c537b5732d090a1a068c1c607c4e24e591706dcc80d09aff1e8
                                • Instruction ID: 7527e9767290a9879f78a072359544dfcb22bc068d658b96aed8a2c465ce59a1
                                • Opcode Fuzzy Hash: 0aa1542d8d639c537b5732d090a1a068c1c607c4e24e591706dcc80d09aff1e8
                                • Instruction Fuzzy Hash: 96F062B14042489EFB158A59DD84B62FFACEF41774F18C55AFD485F382D3789844CAB1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Non-executed Functions

                                Execution Graph

                                Execution Coverage:10.2%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:210
                                Total number of Limit Nodes:13

                                Graph

                                execution_graph 25611 2e2b7d0 25612 2e2b836 25611->25612 25616 2e2b982 25612->25616 25619 2e2b990 25612->25619 25613 2e2b8e5 25622 2e2a224 25616->25622 25620 2e2b9be 25619->25620 25621 2e2a224 DuplicateHandle 25619->25621 25620->25613 25621->25620 25623 2e2b9f8 DuplicateHandle 25622->25623 25625 2e2b9be 25623->25625 25625->25613 25626 2e240d0 25627 2e240e7 25626->25627 25628 2e240f3 25627->25628 25632 2e241f0 25627->25632 25637 2e23870 25628->25637 25630 2e2411e 25633 2e24215 25632->25633 25641 2e242f0 25633->25641 25645 2e242e1 25633->25645 25638 2e2387b 25637->25638 25653 2e25684 25638->25653 25640 2e26ab6 25640->25630 25643 2e24317 25641->25643 25642 2e243f4 25642->25642 25643->25642 25649 2e23e6c 25643->25649 25647 2e242f0 25645->25647 25646 2e243f4 25646->25646 25647->25646 25648 2e23e6c CreateActCtxA 25647->25648 25648->25646 25650 2e25380 CreateActCtxA 25649->25650 25652 2e25443 25650->25652 25654 2e2568f 25653->25654 25657 2e256a4 25654->25657 25656 2e26b85 25656->25640 25658 2e256af 25657->25658 25661 2e256d4 25658->25661 25660 2e26c62 25660->25656 25662 2e256df 25661->25662 25665 2e25704 25662->25665 25664 2e26d62 25664->25660 25666 2e2570f 25665->25666 25668 2e2747e 25666->25668 25672 2e293b8 25666->25672 25667 2e274bc 25667->25664 25668->25667 25676 2e2b508 25668->25676 25681 2e2b4f8 25668->25681 25687 2e293f0 25672->25687 25691 2e293df 25672->25691 25673 2e293ce 25673->25668 25677 2e2b529 25676->25677 25678 2e2b54d 25677->25678 25725 2e2b6a9 25677->25725 25729 2e2b6b8 25677->25729 25678->25667 25682 2e2b49f 25681->25682 25683 2e2b502 25681->25683 25682->25667 25684 2e2b54d 25683->25684 25685 2e2b6b8 4 API calls 25683->25685 25686 2e2b6a9 4 API calls 25683->25686 25684->25667 25685->25684 25686->25684 25697 2e294e8 25687->25697 25705 2e294d9 25687->25705 25688 2e293ff 25688->25673 25692 2e293b1 25691->25692 25693 2e293ee 25691->25693 25692->25673 25694 2e293ff 25693->25694 25695 2e294e8 2 API calls 25693->25695 25696 2e294d9 2 API calls 25693->25696 25694->25673 25695->25694 25696->25694 25698 2e294fb 25697->25698 25699 2e29513 25698->25699 25713 2e29760 25698->25713 25717 2e29770 25698->25717 25699->25688 25700 2e2950b 25700->25699 25701 2e29710 GetModuleHandleW 25700->25701 25702 2e2973d 25701->25702 25702->25688 25706 2e294fb 25705->25706 25707 2e29513 25706->25707 25711 2e29760 LoadLibraryExW 25706->25711 25712 2e29770 LoadLibraryExW 25706->25712 25707->25688 25708 2e2950b 25708->25707 25709 2e29710 GetModuleHandleW 25708->25709 25710 2e2973d 25709->25710 25710->25688 25711->25708 25712->25708 25714 2e29784 25713->25714 25716 2e297a9 25714->25716 25721 2e28818 25714->25721 25716->25700 25718 2e29784 25717->25718 25719 2e28818 LoadLibraryExW 25718->25719 25720 2e297a9 25718->25720 25719->25720 25720->25700 25722 2e29950 LoadLibraryExW 25721->25722 25724 2e299c9 25722->25724 25724->25716 25726 2e2b6c5 25725->25726 25728 2e2b6ff 25726->25728 25733 2e2a19c 25726->25733 25728->25678 25731 2e2b6c5 25729->25731 25730 2e2b6ff 25730->25678 25731->25730 25732 2e2a19c 4 API calls 25731->25732 25732->25730 25734 2e2a1a7 25733->25734 25736 2e2c3f8 25734->25736 25737 2e2bfb8 25734->25737 25738 2e2bfc3 25737->25738 25739 2e25704 4 API calls 25738->25739 25740 2e2c467 25739->25740 25741 2e2c4a0 25740->25741 25743 2e2e214 25740->25743 25741->25736 25744 2e2e225 25743->25744 25745 2e2e22d 25743->25745 25744->25741 25750 2e2e668 LoadLibraryExW GetModuleHandleW 25745->25750 25751 2e2e658 LoadLibraryExW GetModuleHandleW 25745->25751 25746 2e2e265 25748 2e2f030 CreateWindowExW 25746->25748 25749 2e2f01f CreateWindowExW 25746->25749 25747 2e2e30a 25748->25747 25749->25747 25750->25746 25751->25746 25582 7210682 25589 7210eb8 25582->25589 25594 7210ec8 25582->25594 25583 72106a3 25585 8f3f5b3 ReadProcessMemory 25583->25585 25586 8f3f5b8 ReadProcessMemory 25583->25586 25584 7210bcf 25585->25584 25586->25584 25590 7210ee2 25589->25590 25592 8f3f330 SetThreadContext 25590->25592 25593 8f3f328 SetThreadContext 25590->25593 25591 7210f14 25591->25583 25592->25591 25593->25591 25595 7210ee2 25594->25595 25597 8f3f330 SetThreadContext 25595->25597 25598 8f3f328 SetThreadContext 25595->25598 25596 7210f14 25596->25583 25597->25596 25598->25596 25558 7210af6 25559 7210628 25558->25559 25560 7210b16 25558->25560 25560->25559 25564 8f3f5b3 25560->25564 25568 8f3f5b8 25560->25568 25561 7210bcf 25565 8f3f603 ReadProcessMemory 25564->25565 25567 8f3f647 25565->25567 25567->25561 25569 8f3f603 ReadProcessMemory 25568->25569 25571 8f3f647 25569->25571 25571->25561 25752 7210556 25753 721055f 25752->25753 25755 8f3f4c0 WriteProcessMemory 25753->25755 25756 8f3f4c8 WriteProcessMemory 25753->25756 25754 72105a6 25755->25754 25756->25754 25530 72102a9 25531 72102c6 25530->25531 25538 8f3f4c0 25531->25538 25542 8f3f4c8 25531->25542 25532 721032a 25533 72103fe 25532->25533 25546 8f3f330 25532->25546 25550 8f3f328 25532->25550 25539 8f3f510 WriteProcessMemory 25538->25539 25541 8f3f567 25539->25541 25541->25532 25543 8f3f510 WriteProcessMemory 25542->25543 25545 8f3f567 25543->25545 25545->25532 25547 8f3f375 SetThreadContext 25546->25547 25549 8f3f3bd 25547->25549 25549->25533 25551 8f3f375 SetThreadContext 25550->25551 25553 8f3f3bd 25551->25553 25553->25533 25572 7211138 25573 72112f8 25572->25573 25575 721115e 25572->25575 25574 72112c3 25575->25574 25578 72113b0 PostMessageW 25575->25578 25580 72113b8 PostMessageW 25575->25580 25579 7211424 25578->25579 25579->25575 25581 7211424 25580->25581 25581->25575 25599 721014b 25603 8f3f750 25599->25603 25607 8f3f747 25599->25607 25604 8f3f7d9 25603->25604 25604->25604 25605 8f3f93e CreateProcessA 25604->25605 25606 8f3f99b 25605->25606 25608 8f3f7d9 25607->25608 25608->25608 25609 8f3f93e CreateProcessA 25608->25609 25610 8f3f99b 25609->25610 25757 721099a 25758 721099f 25757->25758 25762 7210f28 25758->25762 25767 7210f38 25758->25767 25759 72109c3 25763 7210f52 25762->25763 25772 8f3f400 25763->25772 25776 8f3f408 25763->25776 25764 7210f8d 25764->25759 25768 7210f52 25767->25768 25770 8f3f400 VirtualAllocEx 25768->25770 25771 8f3f408 VirtualAllocEx 25768->25771 25769 7210f8d 25769->25759 25770->25769 25771->25769 25773 8f3f448 VirtualAllocEx 25772->25773 25775 8f3f485 25773->25775 25775->25764 25777 8f3f448 VirtualAllocEx 25776->25777 25779 8f3f485 25777->25779 25779->25764 25780 721049c 25781 72104a5 25780->25781 25785 72110d0 25781->25785 25790 72110bf 25781->25790 25782 72104de 25786 72110ea 25785->25786 25795 8f3f280 25786->25795 25799 8f3f278 25786->25799 25787 7211119 25787->25782 25791 72110ca 25790->25791 25793 8f3f280 ResumeThread 25791->25793 25794 8f3f278 ResumeThread 25791->25794 25792 7211119 25792->25782 25793->25792 25794->25792 25796 8f3f2c0 ResumeThread 25795->25796 25798 8f3f2f1 25796->25798 25798->25787 25800 8f3f2c0 ResumeThread 25799->25800 25802 8f3f2f1 25800->25802 25802->25787 25554 72101af 25556 8f3f4c0 WriteProcessMemory 25554->25556 25557 8f3f4c8 WriteProcessMemory 25554->25557 25555 72101d3 25556->25555 25557->25555

                                Executed Functions

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1062 8f3f747-8f3f7e5 1064 8f3f7e7-8f3f7f1 1062->1064 1065 8f3f81e-8f3f83e 1062->1065 1064->1065 1066 8f3f7f3-8f3f7f5 1064->1066 1072 8f3f840-8f3f84a 1065->1072 1073 8f3f877-8f3f8a6 1065->1073 1068 8f3f7f7-8f3f801 1066->1068 1069 8f3f818-8f3f81b 1066->1069 1070 8f3f803 1068->1070 1071 8f3f805-8f3f814 1068->1071 1069->1065 1070->1071 1071->1071 1074 8f3f816 1071->1074 1072->1073 1075 8f3f84c-8f3f84e 1072->1075 1079 8f3f8a8-8f3f8b2 1073->1079 1080 8f3f8df-8f3f999 CreateProcessA 1073->1080 1074->1069 1077 8f3f871-8f3f874 1075->1077 1078 8f3f850-8f3f85a 1075->1078 1077->1073 1081 8f3f85e-8f3f86d 1078->1081 1082 8f3f85c 1078->1082 1079->1080 1083 8f3f8b4-8f3f8b6 1079->1083 1093 8f3f9a2-8f3fa28 1080->1093 1094 8f3f99b-8f3f9a1 1080->1094 1081->1081 1084 8f3f86f 1081->1084 1082->1081 1085 8f3f8d9-8f3f8dc 1083->1085 1086 8f3f8b8-8f3f8c2 1083->1086 1084->1077 1085->1080 1088 8f3f8c6-8f3f8d5 1086->1088 1089 8f3f8c4 1086->1089 1088->1088 1090 8f3f8d7 1088->1090 1089->1088 1090->1085 1104 8f3fa2a-8f3fa2e 1093->1104 1105 8f3fa38-8f3fa3c 1093->1105 1094->1093 1104->1105 1108 8f3fa30 1104->1108 1106 8f3fa3e-8f3fa42 1105->1106 1107 8f3fa4c-8f3fa50 1105->1107 1106->1107 1109 8f3fa44 1106->1109 1110 8f3fa52-8f3fa56 1107->1110 1111 8f3fa60-8f3fa64 1107->1111 1108->1105 1109->1107 1110->1111 1112 8f3fa58 1110->1112 1113 8f3fa76-8f3fa7d 1111->1113 1114 8f3fa66-8f3fa6c 1111->1114 1112->1111 1115 8f3fa94 1113->1115 1116 8f3fa7f-8f3fa8e 1113->1116 1114->1113 1117 8f3fa95 1115->1117 1116->1115 1117->1117
                                APIs
                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 08F3F986
                                Memory Dump Source
                                • Source File: 0000000D.00000002.323872175.0000000008F30000.00000040.00000001.sdmp, Offset: 08F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_8f30000_dhcpmon.jbxd
                                Similarity
                                • API ID: CreateProcess
                                • String ID:
                                • API String ID: 963392458-0
                                • Opcode ID: ce677b5b25d740078db42e0a9e88e5ecd4ff01c93121de38fa9a89659e92176d
                                • Instruction ID: c1274597e759ad72f2933ce99c5a31680d5651d4b5e308773e14d0246ea55ec4
                                • Opcode Fuzzy Hash: ce677b5b25d740078db42e0a9e88e5ecd4ff01c93121de38fa9a89659e92176d
                                • Instruction Fuzzy Hash: B3914971D00229DFDF14CFA8C881BEDBBB2EF48315F1585AAE809A7250DB749985CF91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1119 8f3f750-8f3f7e5 1121 8f3f7e7-8f3f7f1 1119->1121 1122 8f3f81e-8f3f83e 1119->1122 1121->1122 1123 8f3f7f3-8f3f7f5 1121->1123 1129 8f3f840-8f3f84a 1122->1129 1130 8f3f877-8f3f8a6 1122->1130 1125 8f3f7f7-8f3f801 1123->1125 1126 8f3f818-8f3f81b 1123->1126 1127 8f3f803 1125->1127 1128 8f3f805-8f3f814 1125->1128 1126->1122 1127->1128 1128->1128 1131 8f3f816 1128->1131 1129->1130 1132 8f3f84c-8f3f84e 1129->1132 1136 8f3f8a8-8f3f8b2 1130->1136 1137 8f3f8df-8f3f999 CreateProcessA 1130->1137 1131->1126 1134 8f3f871-8f3f874 1132->1134 1135 8f3f850-8f3f85a 1132->1135 1134->1130 1138 8f3f85e-8f3f86d 1135->1138 1139 8f3f85c 1135->1139 1136->1137 1140 8f3f8b4-8f3f8b6 1136->1140 1150 8f3f9a2-8f3fa28 1137->1150 1151 8f3f99b-8f3f9a1 1137->1151 1138->1138 1141 8f3f86f 1138->1141 1139->1138 1142 8f3f8d9-8f3f8dc 1140->1142 1143 8f3f8b8-8f3f8c2 1140->1143 1141->1134 1142->1137 1145 8f3f8c6-8f3f8d5 1143->1145 1146 8f3f8c4 1143->1146 1145->1145 1147 8f3f8d7 1145->1147 1146->1145 1147->1142 1161 8f3fa2a-8f3fa2e 1150->1161 1162 8f3fa38-8f3fa3c 1150->1162 1151->1150 1161->1162 1165 8f3fa30 1161->1165 1163 8f3fa3e-8f3fa42 1162->1163 1164 8f3fa4c-8f3fa50 1162->1164 1163->1164 1166 8f3fa44 1163->1166 1167 8f3fa52-8f3fa56 1164->1167 1168 8f3fa60-8f3fa64 1164->1168 1165->1162 1166->1164 1167->1168 1169 8f3fa58 1167->1169 1170 8f3fa76-8f3fa7d 1168->1170 1171 8f3fa66-8f3fa6c 1168->1171 1169->1168 1172 8f3fa94 1170->1172 1173 8f3fa7f-8f3fa8e 1170->1173 1171->1170 1174 8f3fa95 1172->1174 1173->1172 1174->1174
                                APIs
                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 08F3F986
                                Memory Dump Source
                                • Source File: 0000000D.00000002.323872175.0000000008F30000.00000040.00000001.sdmp, Offset: 08F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_8f30000_dhcpmon.jbxd
                                Similarity
                                • API ID: CreateProcess
                                • String ID:
                                • API String ID: 963392458-0
                                • Opcode ID: 0aecebc1d54f5456ffaa011591b6173fcb6bf8858cb7892a13e6998430574da8
                                • Instruction ID: 3e946e869436b7d9c98d0da10493146bfec5d2bae268d1912a5ae44c5fa29afa
                                • Opcode Fuzzy Hash: 0aecebc1d54f5456ffaa011591b6173fcb6bf8858cb7892a13e6998430574da8
                                • Instruction Fuzzy Hash: 05914971D00229DFDF14CFA8C884BEDBBB2EF48315F1485A9E809A7250DB749985CF91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1176 2e294e8-2e294fd call 2e271d4 1179 2e29513-2e29517 1176->1179 1180 2e294ff 1176->1180 1181 2e2952b-2e2956c 1179->1181 1182 2e29519-2e29523 1179->1182 1229 2e29505 call 2e29760 1180->1229 1230 2e29505 call 2e29770 1180->1230 1187 2e29579-2e29587 1181->1187 1188 2e2956e-2e29576 1181->1188 1182->1181 1183 2e2950b-2e2950d 1183->1179 1184 2e29648-2e29708 1183->1184 1224 2e29710-2e2973b GetModuleHandleW 1184->1224 1225 2e2970a-2e2970d 1184->1225 1190 2e295ab-2e295ad 1187->1190 1191 2e29589-2e2958e 1187->1191 1188->1187 1192 2e295b0-2e295b7 1190->1192 1193 2e29590-2e29597 call 2e287bc 1191->1193 1194 2e29599 1191->1194 1197 2e295c4-2e295cb 1192->1197 1198 2e295b9-2e295c1 1192->1198 1196 2e2959b-2e295a9 1193->1196 1194->1196 1196->1192 1201 2e295d8-2e295e1 call 2e287cc 1197->1201 1202 2e295cd-2e295d5 1197->1202 1198->1197 1207 2e295e3-2e295eb 1201->1207 1208 2e295ee-2e295f3 1201->1208 1202->1201 1207->1208 1209 2e29611-2e2961e 1208->1209 1210 2e295f5-2e295fc 1208->1210 1217 2e29620-2e2963e 1209->1217 1218 2e29641-2e29647 1209->1218 1210->1209 1212 2e295fe-2e2960e call 2e287dc call 2e287ec 1210->1212 1212->1209 1217->1218 1226 2e29744-2e29758 1224->1226 1227 2e2973d-2e29743 1224->1227 1225->1224 1227->1226 1229->1183 1230->1183
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 02E2972E
                                Memory Dump Source
                                • Source File: 0000000D.00000002.310479745.0000000002E20000.00000040.00000001.sdmp, Offset: 02E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2e20000_dhcpmon.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 254ce498a1c5272f475309a176c3dae8433254e5f0a29818ef6af793adc2c004
                                • Instruction ID: f12b57fa23d9b9726c2052f4a9b75b014d70f7fe58df1e558295162faab69e50
                                • Opcode Fuzzy Hash: 254ce498a1c5272f475309a176c3dae8433254e5f0a29818ef6af793adc2c004
                                • Instruction Fuzzy Hash: 937144B0A00B158FD724DF69D54479AB7F5BF88308F10992ED48AD7A50DB34E849CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1246 2e2fe2d-2e2fe9e 1247 2e2fea0-2e2fea6 1246->1247 1248 2e2fea9-2e2feb0 1246->1248 1247->1248 1249 2e2feb2-2e2feb8 1248->1249 1250 2e2febb-2e2fef3 1248->1250 1249->1250 1251 2e2fefb-2e2ff5a CreateWindowExW 1250->1251 1252 2e2ff63-2e2ff9b 1251->1252 1253 2e2ff5c-2e2ff62 1251->1253 1257 2e2ffa8 1252->1257 1258 2e2ff9d-2e2ffa0 1252->1258 1253->1252 1259 2e2ffa9 1257->1259 1258->1257 1259->1259
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02E2FF4A
                                Memory Dump Source
                                • Source File: 0000000D.00000002.310479745.0000000002E20000.00000040.00000001.sdmp, Offset: 02E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2e20000_dhcpmon.jbxd
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: e88fab1ec3406790a287ec999483769639682cf40bef41f3d2326dbe3dd8732c
                                • Instruction ID: f498b38f310f8fbdd3fd60a37855cad6619186bb062fc3851e80d11a72052375
                                • Opcode Fuzzy Hash: e88fab1ec3406790a287ec999483769639682cf40bef41f3d2326dbe3dd8732c
                                • Instruction Fuzzy Hash: 4851BDB1D003199FDB14CF9AC984ADEBBB5BF88314F24852AE81AAB250D7749945CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1231 2e2dd34-2e2fe9e 1233 2e2fea0-2e2fea6 1231->1233 1234 2e2fea9-2e2feb0 1231->1234 1233->1234 1235 2e2feb2-2e2feb8 1234->1235 1236 2e2febb-2e2ff5a CreateWindowExW 1234->1236 1235->1236 1238 2e2ff63-2e2ff9b 1236->1238 1239 2e2ff5c-2e2ff62 1236->1239 1243 2e2ffa8 1238->1243 1244 2e2ff9d-2e2ffa0 1238->1244 1239->1238 1245 2e2ffa9 1243->1245 1244->1243 1245->1245
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02E2FF4A
                                Memory Dump Source
                                • Source File: 0000000D.00000002.310479745.0000000002E20000.00000040.00000001.sdmp, Offset: 02E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2e20000_dhcpmon.jbxd
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: 8c6101a240410eb7eda060c53b116e54a48212fc88f45fbe67bb66231351abcf
                                • Instruction ID: ee4c2d0b1c301bb9e126cdeb5ff0483d3b864b0f8ac1a3e9085df71bdd69ff05
                                • Opcode Fuzzy Hash: 8c6101a240410eb7eda060c53b116e54a48212fc88f45fbe67bb66231351abcf
                                • Instruction Fuzzy Hash: BA51AFB1D00319DFDB14CF9AC984ADEBBB5FF88314F24852AE819AB250D7749945CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1260 2e25374-2e25441 CreateActCtxA 1262 2e25443-2e25449 1260->1262 1263 2e2544a-2e254a4 1260->1263 1262->1263 1270 2e254b3-2e254b7 1263->1270 1271 2e254a6-2e254a9 1263->1271 1272 2e254c8 1270->1272 1273 2e254b9-2e254c5 1270->1273 1271->1270 1275 2e254c9 1272->1275 1273->1272 1275->1275
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 02E25431
                                Memory Dump Source
                                • Source File: 0000000D.00000002.310479745.0000000002E20000.00000040.00000001.sdmp, Offset: 02E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2e20000_dhcpmon.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 2ab64d305ea64f84c6d96a68a9c11a5dc11367aa3c277554484a77fbae7c087a
                                • Instruction ID: 368ee77985e5927ad41bb822848fc3b2889919e95021ae5ceee1cb21b2d7e216
                                • Opcode Fuzzy Hash: 2ab64d305ea64f84c6d96a68a9c11a5dc11367aa3c277554484a77fbae7c087a
                                • Instruction Fuzzy Hash: 0B41F4B1C00629CBDB24CF99C9847DDBBB5BF48309F64846AD40ABB251DB71694ACF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1276 2e23e6c-2e25441 CreateActCtxA 1279 2e25443-2e25449 1276->1279 1280 2e2544a-2e254a4 1276->1280 1279->1280 1287 2e254b3-2e254b7 1280->1287 1288 2e254a6-2e254a9 1280->1288 1289 2e254c8 1287->1289 1290 2e254b9-2e254c5 1287->1290 1288->1287 1292 2e254c9 1289->1292 1290->1289 1292->1292
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 02E25431
                                Memory Dump Source
                                • Source File: 0000000D.00000002.310479745.0000000002E20000.00000040.00000001.sdmp, Offset: 02E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2e20000_dhcpmon.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: a36a78624b2f1271b33a0062b0620543f19f240a45e3362691f52abb21cd4716
                                • Instruction ID: bbf3908be5e3f81cd5f5f839bdd4c4b98520716ed3345b909b08d91c1c73e206
                                • Opcode Fuzzy Hash: a36a78624b2f1271b33a0062b0620543f19f240a45e3362691f52abb21cd4716
                                • Instruction Fuzzy Hash: 8E41D470C00628CFDB24CF99C9447DDBBB5BF49308F60846AD40ABB255DB756949CF91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1293 2e2baba-2e2bac0 1294 2e2bac2-2e2bbe6 1293->1294 1295 2e2ba65-2e2ba8c DuplicateHandle 1293->1295 1296 2e2ba95-2e2bab2 1295->1296 1297 2e2ba8e-2e2ba94 1295->1297 1297->1296
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02E2B9BE,?,?,?,?,?), ref: 02E2BA7F
                                Memory Dump Source
                                • Source File: 0000000D.00000002.310479745.0000000002E20000.00000040.00000001.sdmp, Offset: 02E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2e20000_dhcpmon.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 7e81eb418d85e90f50f3963a115e6f3638996e789a2d27e2f48b530800aa5e46
                                • Instruction ID: 721b7d517517f7d6b1fbeefe50fbd34e2482736e4600024829d8c75365a711cf
                                • Opcode Fuzzy Hash: 7e81eb418d85e90f50f3963a115e6f3638996e789a2d27e2f48b530800aa5e46
                                • Instruction Fuzzy Hash: DD316B79650208BFEB089F64F89ABA97BA9F788300F50802AF9058F3C9DB745805CF11
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1312 8f3f4c0-8f3f516 1314 8f3f526-8f3f565 WriteProcessMemory 1312->1314 1315 8f3f518-8f3f524 1312->1315 1317 8f3f567-8f3f56d 1314->1317 1318 8f3f56e-8f3f59e 1314->1318 1315->1314 1317->1318
                                APIs
                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08F3F558
                                Memory Dump Source
                                • Source File: 0000000D.00000002.323872175.0000000008F30000.00000040.00000001.sdmp, Offset: 08F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_8f30000_dhcpmon.jbxd
                                Similarity
                                • API ID: MemoryProcessWrite
                                • String ID:
                                • API String ID: 3559483778-0
                                • Opcode ID: 0c65904dc72cc9c803d2c3c992df438b2412c5f0232317a0e4697f6b277a0a91
                                • Instruction ID: 4d8141bf56190fe928d1280f95a7b9690852c5e760f2a2739dc29c7f8b58a714
                                • Opcode Fuzzy Hash: 0c65904dc72cc9c803d2c3c992df438b2412c5f0232317a0e4697f6b277a0a91
                                • Instruction Fuzzy Hash: C02166B1D003599FCB10CFA9C884BEEBBF5FF48314F10882AE959A3250C7389944CBA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1322 8f3f4c8-8f3f516 1324 8f3f526-8f3f565 WriteProcessMemory 1322->1324 1325 8f3f518-8f3f524 1322->1325 1327 8f3f567-8f3f56d 1324->1327 1328 8f3f56e-8f3f59e 1324->1328 1325->1324 1327->1328
                                APIs
                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08F3F558
                                Memory Dump Source
                                • Source File: 0000000D.00000002.323872175.0000000008F30000.00000040.00000001.sdmp, Offset: 08F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_8f30000_dhcpmon.jbxd
                                Similarity
                                • API ID: MemoryProcessWrite
                                • String ID:
                                • API String ID: 3559483778-0
                                • Opcode ID: a3170a669e7ea3d00fdc0b7cbd00109df4aa991ca7eaa35e2d05191b1c869172
                                • Instruction ID: 564ac2444a9568be08414461036853040d3953b85d29d74c7cd0beedf956e028
                                • Opcode Fuzzy Hash: a3170a669e7ea3d00fdc0b7cbd00109df4aa991ca7eaa35e2d05191b1c869172
                                • Instruction Fuzzy Hash: 72212A71D003599FCB10CFA9C9847DEBBF5FF48314F108829E919A7250D7789954CBA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1332 2e2a224-2e2ba8c DuplicateHandle 1335 2e2ba95-2e2bab2 1332->1335 1336 2e2ba8e-2e2ba94 1332->1336 1336->1335
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02E2B9BE,?,?,?,?,?), ref: 02E2BA7F
                                Memory Dump Source
                                • Source File: 0000000D.00000002.310479745.0000000002E20000.00000040.00000001.sdmp, Offset: 02E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2e20000_dhcpmon.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 3065818738190a31d90decc1142dafef505095680f01d4608228e32fdc5370ba
                                • Instruction ID: f32caeeb5834d627e3814ca041438ab1d2ed4782adb10ff6158aea59b3f5ec58
                                • Opcode Fuzzy Hash: 3065818738190a31d90decc1142dafef505095680f01d4608228e32fdc5370ba
                                • Instruction Fuzzy Hash: 1421E3B5900219EFDB10CF9AD584BDEBBF8EB48324F14841AE915A7310D374A954CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1339 2e2b9f0-2e2ba64 1340 2e2ba65-2e2ba8c DuplicateHandle 1339->1340 1341 2e2ba95-2e2bab2 1340->1341 1342 2e2ba8e-2e2ba94 1340->1342 1342->1341
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02E2B9BE,?,?,?,?,?), ref: 02E2BA7F
                                Memory Dump Source
                                • Source File: 0000000D.00000002.310479745.0000000002E20000.00000040.00000001.sdmp, Offset: 02E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2e20000_dhcpmon.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: f92ecb5746774ab2fe0e84130c8c5c20181c9a6204239dd7e22435a92f77ba41
                                • Instruction ID: 0299a859afc91b7621021f227d0e516f7b7d043914af7f006d71ec958794eaef
                                • Opcode Fuzzy Hash: f92ecb5746774ab2fe0e84130c8c5c20181c9a6204239dd7e22435a92f77ba41
                                • Instruction Fuzzy Hash: 6221D2B5D002199FDB10CFA9D584ADEBBF8EF48324F14845AE955A3310D378A944DFA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1355 8f3f330-8f3f37b 1357 8f3f38b-8f3f3bb SetThreadContext 1355->1357 1358 8f3f37d-8f3f389 1355->1358 1360 8f3f3c4-8f3f3f4 1357->1360 1361 8f3f3bd-8f3f3c3 1357->1361 1358->1357 1361->1360
                                APIs
                                • SetThreadContext.KERNELBASE(?,00000000), ref: 08F3F3AE
                                Memory Dump Source
                                • Source File: 0000000D.00000002.323872175.0000000008F30000.00000040.00000001.sdmp, Offset: 08F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_8f30000_dhcpmon.jbxd
                                Similarity
                                • API ID: ContextThread
                                • String ID:
                                • API String ID: 1591575202-0
                                • Opcode ID: 961f1228c2fa92fa350862641a0aa1d248e19812cb68be5e1fd966f0481eb907
                                • Instruction ID: 12914d2233af2f2a7764253fc29cc946316459b5effeca536a32ef1727f84746
                                • Opcode Fuzzy Hash: 961f1228c2fa92fa350862641a0aa1d248e19812cb68be5e1fd966f0481eb907
                                • Instruction Fuzzy Hash: EF2118B1D002199FDB10CFAAC5847EEBBF4EF48224F14842AD959A7250DB789945CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1345 8f3f328-8f3f37b 1347 8f3f38b-8f3f3bb SetThreadContext 1345->1347 1348 8f3f37d-8f3f389 1345->1348 1350 8f3f3c4-8f3f3f4 1347->1350 1351 8f3f3bd-8f3f3c3 1347->1351 1348->1347 1351->1350
                                APIs
                                • SetThreadContext.KERNELBASE(?,00000000), ref: 08F3F3AE
                                Memory Dump Source
                                • Source File: 0000000D.00000002.323872175.0000000008F30000.00000040.00000001.sdmp, Offset: 08F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_8f30000_dhcpmon.jbxd
                                Similarity
                                • API ID: ContextThread
                                • String ID:
                                • API String ID: 1591575202-0
                                • Opcode ID: 76b6998c84e0d497629c0fef8ca367c2219a650db8b94440b92bca4728b7dee1
                                • Instruction ID: 20977f7a3ffbf4bebb3054f9992291453df72f79aae64afac137e25dea3adeee
                                • Opcode Fuzzy Hash: 76b6998c84e0d497629c0fef8ca367c2219a650db8b94440b92bca4728b7dee1
                                • Instruction Fuzzy Hash: 042138B2D006198FDB10CFA9C5847EEBBF4EF48224F14842AD959A7250DB789945CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08F3F638
                                Memory Dump Source
                                • Source File: 0000000D.00000002.323872175.0000000008F30000.00000040.00000001.sdmp, Offset: 08F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_8f30000_dhcpmon.jbxd
                                Similarity
                                • API ID: MemoryProcessRead
                                • String ID:
                                • API String ID: 1726664587-0
                                • Opcode ID: 43248b59e43bd6927d64f82cc91ffc062fb80ce60b65e72eccfeff46b8823d28
                                • Instruction ID: b510ea6e9df9dcea1b65026cd85ae7e67e6769db1dcc2c3849cec065a09b565d
                                • Opcode Fuzzy Hash: 43248b59e43bd6927d64f82cc91ffc062fb80ce60b65e72eccfeff46b8823d28
                                • Instruction Fuzzy Hash: 512128B5D00219DFCB00CFA9C9847EEBBB5FF48324F10882AE919A7250D7389545DBA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08F3F638
                                Memory Dump Source
                                • Source File: 0000000D.00000002.323872175.0000000008F30000.00000040.00000001.sdmp, Offset: 08F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_8f30000_dhcpmon.jbxd
                                Similarity
                                • API ID: MemoryProcessRead
                                • String ID:
                                • API String ID: 1726664587-0
                                • Opcode ID: b045dedd77bd9f14c998b548e24f9d8a6f57c8e47a1434e86e50a7c78362b0bb
                                • Instruction ID: 7342ed3d233d7282074f93e151637ca88b8669ed1373f4ddfca75e0f92dc03ae
                                • Opcode Fuzzy Hash: b045dedd77bd9f14c998b548e24f9d8a6f57c8e47a1434e86e50a7c78362b0bb
                                • Instruction Fuzzy Hash: 56213C71C003599FCB10CFA9C9446EEBBF5FF48314F50882AE519A7250D7349545DBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08F3F476
                                Memory Dump Source
                                • Source File: 0000000D.00000002.323872175.0000000008F30000.00000040.00000001.sdmp, Offset: 08F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_8f30000_dhcpmon.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 3cfdef1f210c14d7a77dec3c64efeea417bf084f35d692b7bd17b85576fdc9f3
                                • Instruction ID: 6502d0af5c8d5bb8b32ffac672968ed33135994c8de2224d96dab62adaea89f3
                                • Opcode Fuzzy Hash: 3cfdef1f210c14d7a77dec3c64efeea417bf084f35d692b7bd17b85576fdc9f3
                                • Instruction Fuzzy Hash: 071147B1C002499FDB10CFA9C8446EFBBF5EF88314F24881AE915A7260C7359954CBA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02E297A9,00000800,00000000,00000000), ref: 02E299BA
                                Memory Dump Source
                                • Source File: 0000000D.00000002.310479745.0000000002E20000.00000040.00000001.sdmp, Offset: 02E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2e20000_dhcpmon.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: c20d75bdef688417bfb23709f4478c58111988f2cc2f02a1d767679ee35df726
                                • Instruction ID: 62c510944654110ec6e2a34608716641561165fbc5aafc692172dd730330df55
                                • Opcode Fuzzy Hash: c20d75bdef688417bfb23709f4478c58111988f2cc2f02a1d767679ee35df726
                                • Instruction Fuzzy Hash: 821106B59002199FDB10CF9AC544BDEBBF4EB48324F24942AD416B7610C374A545CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02E297A9,00000800,00000000,00000000), ref: 02E299BA
                                Memory Dump Source
                                • Source File: 0000000D.00000002.310479745.0000000002E20000.00000040.00000001.sdmp, Offset: 02E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2e20000_dhcpmon.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: d73583e6828e3ba6fa0d698f8927542f39966bb1ca2de1fa29b4d6849554108f
                                • Instruction ID: c9ea22275b5f5e407256157bbfc3a1a5b4ec62db695ab9b015274eb74582f8fe
                                • Opcode Fuzzy Hash: d73583e6828e3ba6fa0d698f8927542f39966bb1ca2de1fa29b4d6849554108f
                                • Instruction Fuzzy Hash: 621114B69002199FDB10CF9AC948BDEFBF8EB88324F14842AD456B7710C374A549CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08F3F476
                                Memory Dump Source
                                • Source File: 0000000D.00000002.323872175.0000000008F30000.00000040.00000001.sdmp, Offset: 08F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_8f30000_dhcpmon.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 9b83ff3db127a0860c969f594479ccc8d00eb29a3608fe2087987ea7a8375c45
                                • Instruction ID: 9214323c097dee606837728dfd1794b977849c6fe72e1cc6a8ef9cad4b97957d
                                • Opcode Fuzzy Hash: 9b83ff3db127a0860c969f594479ccc8d00eb29a3608fe2087987ea7a8375c45
                                • Instruction Fuzzy Hash: C3115671C002089FCB10CFAAC844AEFBBF9EF88324F248819E515A7260CB359954CBA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                Memory Dump Source
                                • Source File: 0000000D.00000002.323872175.0000000008F30000.00000040.00000001.sdmp, Offset: 08F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_8f30000_dhcpmon.jbxd
                                Similarity
                                • API ID: ResumeThread
                                • String ID:
                                • API String ID: 947044025-0
                                • Opcode ID: 9579063cb89516f99b2cb4371b5cee3c0184fe3e9105a77d5facc83fb646d0a9
                                • Instruction ID: 8fdb8e353aa34d3b8d9e038527674a35f96d201ab21c55d9d379e49381967502
                                • Opcode Fuzzy Hash: 9579063cb89516f99b2cb4371b5cee3c0184fe3e9105a77d5facc83fb646d0a9
                                • Instruction Fuzzy Hash: 43115B71D002588FCB10CFAAC4447DEFBF8EF88224F248819C415B7250CB349544CBA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                Memory Dump Source
                                • Source File: 0000000D.00000002.323872175.0000000008F30000.00000040.00000001.sdmp, Offset: 08F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_8f30000_dhcpmon.jbxd
                                Similarity
                                • API ID: ResumeThread
                                • String ID:
                                • API String ID: 947044025-0
                                • Opcode ID: 49da931e0fd1ce01fef8215438a16baf2bfa833c6f9fd6d7c5190ed56e05aed8
                                • Instruction ID: b19db670bd4cf6b92fdda2e431d844d31c6a69e2d785c9533413a753c81bb430
                                • Opcode Fuzzy Hash: 49da931e0fd1ce01fef8215438a16baf2bfa833c6f9fd6d7c5190ed56e05aed8
                                • Instruction Fuzzy Hash: 0D1146B5D00218CFDB10CFA9C5457EEBBF8EB48228F24882AC419B7250CB389544CBA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 02E2972E
                                Memory Dump Source
                                • Source File: 0000000D.00000002.310479745.0000000002E20000.00000040.00000001.sdmp, Offset: 02E20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2e20000_dhcpmon.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: f90f4c0009b35f90a9f34a2d8320d0e031cd7a1f68358623e24959367f8286ac
                                • Instruction ID: f6e2459c09cb30aedca0235462b9228c35e4ac0f9b7d7b6a2b49b76151bd77bb
                                • Opcode Fuzzy Hash: f90f4c0009b35f90a9f34a2d8320d0e031cd7a1f68358623e24959367f8286ac
                                • Instruction Fuzzy Hash: AA1102B5C006598FCB10CF9AC444ADEFBF4EF88328F24842AD419A7610C374A545CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • PostMessageW.USER32(?,?,?,?), ref: 07211415
                                Memory Dump Source
                                • Source File: 0000000D.00000002.322905090.0000000007210000.00000040.00000001.sdmp, Offset: 07210000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_7210000_dhcpmon.jbxd
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: df9af44e80d7f67ca0fedb8a4c9a52e031b197e25e60d68d67834ae9aaafdbba
                                • Instruction ID: 2632c25b703a4f1bddbcc3cf3946119e5e120b0196af17e51fb4900fb508da2d
                                • Opcode Fuzzy Hash: df9af44e80d7f67ca0fedb8a4c9a52e031b197e25e60d68d67834ae9aaafdbba
                                • Instruction Fuzzy Hash: A21122B58006499FDB10CF99C988BDEBBF8EB48324F24881AD555A7650D374A594CFA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • PostMessageW.USER32(?,?,?,?), ref: 07211415
                                Memory Dump Source
                                • Source File: 0000000D.00000002.322905090.0000000007210000.00000040.00000001.sdmp, Offset: 07210000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_7210000_dhcpmon.jbxd
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: 75dff280abe511119475f3d9f7427703cf1d8b45e01550899fadc298cf942d86
                                • Instruction ID: b32f928df740758bfe6843d036668b6347b7025b47afe4a59f274af34705f70c
                                • Opcode Fuzzy Hash: 75dff280abe511119475f3d9f7427703cf1d8b45e01550899fadc298cf942d86
                                • Instruction Fuzzy Hash: 281115B58007499FDB10CF9AC488BDEBBF8FB48324F20841AE515A3610D374A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 0000000D.00000002.310214671.0000000002CCD000.00000040.00000001.sdmp, Offset: 02CCD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2ccd000_dhcpmon.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b8b13c6484cb674819bf5c5e83672003bac5ec609bf38d9bace822ce264d6593
                                • Instruction ID: 4f28007207984e3dfd6540ef596b7f0899f08772016d076e4678784440e1cf28
                                • Opcode Fuzzy Hash: b8b13c6484cb674819bf5c5e83672003bac5ec609bf38d9bace822ce264d6593
                                • Instruction Fuzzy Hash: 122103B2500244DFDB05DF54D9C0B66BB65FBC8328F34897DE8060B246C336D946CBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 0000000D.00000002.310214671.0000000002CCD000.00000040.00000001.sdmp, Offset: 02CCD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2ccd000_dhcpmon.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7830a167ef2e7a6593bb15219790260fb851239f6737c058ac368af2ece7d662
                                • Instruction ID: de3009285e80b271b9da97d1f371dc3df13809fd7895b98b818d4d7ac5f01e1a
                                • Opcode Fuzzy Hash: 7830a167ef2e7a6593bb15219790260fb851239f6737c058ac368af2ece7d662
                                • Instruction Fuzzy Hash: F721F1B1500204EFDB08CF50D9C4B66BB69FB88324F34897DE90A0B206C336E846CAA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 0000000D.00000002.310250829.0000000002CDD000.00000040.00000001.sdmp, Offset: 02CDD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2cdd000_dhcpmon.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a267440be1bc6ce209a5afa039626f94c937acc7d0f8b7a7831ff50d819540b9
                                • Instruction ID: 085422a2f9bdaf42094b61b1e0de7ed799a2d8bd75345cc896d5c80ed6602e43
                                • Opcode Fuzzy Hash: a267440be1bc6ce209a5afa039626f94c937acc7d0f8b7a7831ff50d819540b9
                                • Instruction Fuzzy Hash: 2121F2B2904344DFDB14DF24D9C4B66BBA5FBC8314F64C969E90A4B246C336E847CBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 0000000D.00000002.310250829.0000000002CDD000.00000040.00000001.sdmp, Offset: 02CDD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2cdd000_dhcpmon.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: aef0e2c9fdefce79a4879d6d9f44b67375275b5b53a5d19c948b15fcb2560397
                                • Instruction ID: 11172c5d7210e5fb65c3990d4eaad0720a8ca032bc2faed17117ba17c21e83b8
                                • Opcode Fuzzy Hash: aef0e2c9fdefce79a4879d6d9f44b67375275b5b53a5d19c948b15fcb2560397
                                • Instruction Fuzzy Hash: 082104B2D04204EFDB01DF50D9C4B26BBA5FBC8318F24C9A9E94A4B242C336DC46CB61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 0000000D.00000002.310250829.0000000002CDD000.00000040.00000001.sdmp, Offset: 02CDD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2cdd000_dhcpmon.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6452cf3eafa8a30f112eff2f77168766ff2ea9e5067856a44bde97278d7a6c27
                                • Instruction ID: ce8fed7ec7e4391981fd72d3154405f4663732ba22bd00e3d342198450d83508
                                • Opcode Fuzzy Hash: 6452cf3eafa8a30f112eff2f77168766ff2ea9e5067856a44bde97278d7a6c27
                                • Instruction Fuzzy Hash: E42192765093C08FDB12CF24D590715BF71EB86214F28C5EAD8498F697C33AD80ACBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 0000000D.00000002.310214671.0000000002CCD000.00000040.00000001.sdmp, Offset: 02CCD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2ccd000_dhcpmon.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b026a0720eb4c1b8d48423054a7afd16db820eb83f93aa31c1cd4e4ebf195fc9
                                • Instruction ID: b57dbd719317a8805ba58b5a82e74bc95f8f0d6656334516d584b333ead0b801
                                • Opcode Fuzzy Hash: b026a0720eb4c1b8d48423054a7afd16db820eb83f93aa31c1cd4e4ebf195fc9
                                • Instruction Fuzzy Hash: A711B176404280DFDB15CF10D9C4B16BF71FB84324F24C6ADD9094B656C33AE55ACBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 0000000D.00000002.310214671.0000000002CCD000.00000040.00000001.sdmp, Offset: 02CCD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2ccd000_dhcpmon.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b026a0720eb4c1b8d48423054a7afd16db820eb83f93aa31c1cd4e4ebf195fc9
                                • Instruction ID: e22e54892c5bdea913049d1bf8f1a8d4a2bec68e5541a704b7cef5adbfe43c00
                                • Opcode Fuzzy Hash: b026a0720eb4c1b8d48423054a7afd16db820eb83f93aa31c1cd4e4ebf195fc9
                                • Instruction Fuzzy Hash: A211B1B6804280CFDB11CF10D9C4B16BF71FB84324F24C6ADD8450B656C336D55ACBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 0000000D.00000002.310250829.0000000002CDD000.00000040.00000001.sdmp, Offset: 02CDD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2cdd000_dhcpmon.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8d4a615e5dd6ad9fc3a51053f329abe2d5799460873fcff9efeb80ce7cc17978
                                • Instruction ID: 456c81dade9bdff61a28adb9374008086aa88b04d95fae87ef11e55c82387c90
                                • Opcode Fuzzy Hash: 8d4a615e5dd6ad9fc3a51053f329abe2d5799460873fcff9efeb80ce7cc17978
                                • Instruction Fuzzy Hash: 78119D76904280DFDB11CF10D5C4B15FBB1FB84324F28C6ADD94A4B656C33AD94ACB61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 0000000D.00000002.310214671.0000000002CCD000.00000040.00000001.sdmp, Offset: 02CCD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2ccd000_dhcpmon.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9786b9063f453df7d84f989647ea7b5fe6b1bcdf47be11482809ffd575ed68ad
                                • Instruction ID: 3251bcb6fde61266b9433057a6943ec1825782f8d06bffa35c93ba7a41bf2be7
                                • Opcode Fuzzy Hash: 9786b9063f453df7d84f989647ea7b5fe6b1bcdf47be11482809ffd575ed68ad
                                • Instruction Fuzzy Hash: 00012B714043449AE710AE56CD847A7FBDCEF80238F288C6EED4E5F242D3789884C6B1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 0000000D.00000002.310214671.0000000002CCD000.00000040.00000001.sdmp, Offset: 02CCD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_2ccd000_dhcpmon.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1ba2d806fa101bac59ee84c26fc5105979415028bc6ab6770f428b1e2c3f0265
                                • Instruction ID: aa4553d1650d7ff787091a82b4f9388c84959dafb7bd366a209479822e0a7d70
                                • Opcode Fuzzy Hash: 1ba2d806fa101bac59ee84c26fc5105979415028bc6ab6770f428b1e2c3f0265
                                • Instruction Fuzzy Hash: AFF06271404744AEEB109A1ADD84B62FF98EF81734F28C85AED095F292D3789944CAB1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Non-executed Functions