Loading ...

Play interactive tourEdit tour

Windows Analysis Report TT#U007e)9383763563783039847949N.cmd.exe

Overview

General Information

Sample Name:TT#U007e)9383763563783039847949N.cmd.exe
Analysis ID:552771
MD5:398e8790480f654b4d677847ba454560
SHA1:5cf48784813136868bdf1d995500056eaeb702a2
SHA256:c839234f96d6ce5d83f511ff6aa0d0afc7a680bc478c81416592c981bb066058
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sigma detected: Suspicius Add Task From User AppData Temp
Machine Learning detection for sample
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Sigma detected: Powershell Defender Exclusion
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • TT#U007e)9383763563783039847949N.cmd.exe (PID: 6280 cmdline: "C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe" MD5: 398E8790480F654B4D677847BA454560)
    • powershell.exe (PID: 6768 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wUDpvSE.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 6788 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wUDpvSE" /XML "C:\Users\user\AppData\Local\Temp\tmp1EE6.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 6956 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
      • schtasks.exe (PID: 2672 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp3840.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 3724 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp42FF.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • RegSvcs.exe (PID: 476 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe 0 MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 6408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6636 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 6344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 3748 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 6936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "423b1032-a4e4-4490-8998-68a509ca", "Group": "", "Domain1": "55098hustlenow.hopto.org", "Domain2": "185.140.53.130", "Port": 55098, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000A.00000002.517211527.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000A.00000002.517211527.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000A.00000002.517211527.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    0000000A.00000002.523432863.00000000059D0000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    0000000A.00000002.523432863.00000000059D0000.00000004.00020000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    Click to see the 29 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    10.2.RegSvcs.exe.41b4c55.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xb184:$x1: NanoCore.ClientPluginHost
    • 0x24178:$x1: NanoCore.ClientPluginHost
    • 0xb1b1:$x2: IClientNetworkHost
    • 0x241a5:$x2: IClientNetworkHost
    10.2.RegSvcs.exe.41b4c55.4.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xb184:$x2: NanoCore.ClientPluginHost
    • 0x24178:$x2: NanoCore.ClientPluginHost
    • 0xc25f:$s4: PipeCreated
    • 0x25253:$s4: PipeCreated
    • 0xb19e:$s5: IClientLoggingHost
    • 0x24192:$s5: IClientLoggingHost
    10.2.RegSvcs.exe.41b4c55.4.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe38d:$x1: NanoCore.ClientPluginHost
      • 0xe3ca:$x2: IClientNetworkHost
      • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe105:$x1: NanoCore Client.exe
      • 0xe38d:$x2: NanoCore.ClientPluginHost
      • 0xf9c6:$s1: PluginCommand
      • 0xf9ba:$s2: FileCommand
      • 0x1086b:$s3: PipeExists
      • 0x16622:$s4: PipeCreated
      • 0xe3b7:$s5: IClientLoggingHost
      Click to see the 59 entries

      Sigma Overview

      AV Detection:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6956, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6956, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      System Summary:

      barindex
      Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper ArgumentsShow sources
      Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth, Christian Burkard: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: "C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe" , ParentImage: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe, ParentProcessId: 6280, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6956
      Sigma detected: Suspicius Add Task From User AppData TempShow sources
      Source: Process startedAuthor: frack113: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wUDpvSE" /XML "C:\Users\user\AppData\Local\Temp\tmp1EE6.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wUDpvSE" /XML "C:\Users\user\AppData\Local\Temp\tmp1EE6.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe" , ParentImage: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe, ParentProcessId: 6280, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wUDpvSE" /XML "C:\Users\user\AppData\Local\Temp\tmp1EE6.tmp, ProcessId: 6788
      Sigma detected: Powershell Defender ExclusionShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wUDpvSE.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wUDpvSE.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe" , ParentImage: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe, ParentProcessId: 6280, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wUDpvSE.exe, ProcessId: 6768
      Sigma detected: Possible Applocker BypassShow sources
      Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: "C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe" , ParentImage: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe, ParentProcessId: 6280, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6956
      Sigma detected: Non Interactive PowerShellShow sources
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wUDpvSE.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wUDpvSE.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe" , ParentImage: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe, ParentProcessId: 6280, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wUDpvSE.exe, ProcessId: 6768
      Sigma detected: T1086 PowerShell ExecutionShow sources
      Source: Pipe createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: PipeName: \PSHost.132865994266195793.6768.DefaultAppDomain.powershell

      Stealing of Sensitive Information:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6956, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6956, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 0000000A.00000002.522152896.00000000041A9000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "423b1032-a4e4-4490-8998-68a509ca", "Group": "", "Domain1": "55098hustlenow.hopto.org", "Domain2": "185.140.53.130", "Port": 55098, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
      Multi AV Scanner detection for submitted fileShow sources
      Source: TT#U007e)9383763563783039847949N.cmd.exeVirustotal: Detection: 30%Perma Link
      Source: TT#U007e)9383763563783039847949N.cmd.exeReversingLabs: Detection: 31%
      Antivirus / Scanner detection for submitted sampleShow sources
      Source: TT#U007e)9383763563783039847949N.cmd.exeAvira: detected
      Antivirus detection for URL or domainShow sources
      Source: 55098hustlenow.hopto.orgAvira URL Cloud: Label: malware
      Antivirus detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\wUDpvSE.exeAvira: detection malicious, Label: HEUR/AGEN.1211287
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\wUDpvSE.exeReversingLabs: Detection: 31%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41b4c55.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.5a70000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.5a74629.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41b062c.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41b062c.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.5a70000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41ab7f6.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000A.00000002.517211527.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.524096119.0000000005A70000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.522152896.00000000041A9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.285492337.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.287299484.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.286086026.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.286443560.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.291731877.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: TT#U007e)9383763563783039847949N.cmd.exe PID: 6280, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6956, type: MEMORYSTR
      Machine Learning detection for sampleShow sources
      Source: TT#U007e)9383763563783039847949N.cmd.exeJoe Sandbox ML: detected
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\wUDpvSE.exeJoe Sandbox ML: detected
      Source: 10.0.RegSvcs.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10.0.RegSvcs.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10.2.RegSvcs.exe.5a70000.6.unpackAvira: Label: TR/NanoCore.fadte
      Source: 10.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10.0.RegSvcs.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10.0.RegSvcs.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: TT#U007e)9383763563783039847949N.cmd.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
      Source: TT#U007e)9383763563783039847949N.cmd.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 0000000A.00000003.292607922.0000000001506000.00000004.00000001.sdmp, dhcpmon.exe, 00000018.00000000.306676760.0000000000662000.00000002.00020000.sdmp, dhcpmon.exe, 0000001B.00000000.312590099.0000000000B12000.00000002.00020000.sdmp, dhcpmon.exe.10.dr
      Source: Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe, 0000001B.00000000.312590099.0000000000B12000.00000002.00020000.sdmp, dhcpmon.exe.10.dr

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: 185.140.53.130
      Source: Malware configuration extractorURLs: 55098hustlenow.hopto.org
      Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
      Source: Joe Sandbox ViewIP Address: 185.140.53.130 185.140.53.130
      Source: global trafficTCP traffic: 192.168.2.7:49755 -> 185.140.53.130:55098
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249304688.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249546896.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249369869.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249269040.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249512717.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249418057.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249341299.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249321113.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290448066.0000000002A11000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290665928.0000000002B05000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255594967.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255372335.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255496741.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255324735.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255846246.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255935438.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255251897.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255667936.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255752748.00000000059E3000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255251897.00000000059E3000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html-KS
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253588617.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253223941.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253553298.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253396882.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com#
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comEac
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC8Zk
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comark
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253553298.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253396882.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254128575.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254203350.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254045934.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254422402.00000000059E4000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253704993.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254268609.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254349036.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253641393.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254438755.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253588617.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comd
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253553298.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comexc
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254128575.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254045934.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comf
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253279851.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253223941.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comh
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253279851.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253223941.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comi
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253553298.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comic
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253279851.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253177386.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253223941.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comintPM5
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254045934.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comk
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253553298.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253396882.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253279851.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253704993.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253641393.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253588617.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comlt
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comngH
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253704993.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.como.4_
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254128575.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254045934.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253704993.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253641393.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.como.Z
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254545994.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254128575.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254203350.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254045934.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254422402.00000000059E4000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254268609.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254349036.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254493580.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254438755.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254578361.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comoup
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253553298.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253704993.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253641393.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253588617.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.compt
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comtig
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258049572.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258653845.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.265417311.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.265594159.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259615165.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259511953.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.265557060.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257560261.00000000059E1000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257560261.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257934659.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258000234.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257890841.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257691635.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257768686.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258049572.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257803673.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257844080.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/#
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259425766.00000000059FE000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259476036.00000000059FE000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259494683.00000000059FE000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259592103.00000000059FE000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259425766.00000000059FE000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259476036.00000000059FE000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmle
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258477171.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257691635.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257768686.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257803673.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257844080.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersIO
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258520673.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersL
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258097151.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258049572.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersz
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290348711.0000000001237000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comH
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290348711.0000000001237000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comc
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290348711.0000000001237000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comiona;
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252095130.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251951595.00000000059E0000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252023972.00000000059E4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn#
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252297737.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252558373.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252297737.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252437061.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/D
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252701018.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252987912.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252558373.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252899088.00000000059E4000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252654866.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252297737.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252437061.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252807976.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252095130.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnark
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252701018.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252987912.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252558373.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252899088.00000000059E4000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252654866.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252297737.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252437061.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252807976.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252095130.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnof
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263966160.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263481283.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262892359.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263047005.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264942059.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262567128.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262651157.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263798575.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263174369.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262080103.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.265123364.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261890230.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262722697.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264511515.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264282825.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264576153.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261665039.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262822420.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264168250.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264402497.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262345506.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262472848.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264643079.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264819301.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263289261.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264745512.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262958425.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263575655.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263674251.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264890795.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261798424.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263384878.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262196771.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.265046921.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261751120.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264690366.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262266305.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261961584.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261890230.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261665039.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261798424.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261751120.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261961584.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmsKi
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251427214.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251543225.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257560261.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258097151.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257934659.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257258739.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.256844923.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258000234.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257331089.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257890841.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257093466.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257691635.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258318684.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257768686.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.256992134.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258232502.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258149491.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258049572.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.256782660.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.256920302.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257396363.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257208790.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257803673.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257844080.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257470233.00000000059E1000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.FM
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.248588328.00000000059C2000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.248588328.00000000059C2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comGD
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.248588328.00000000059C2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comiviV
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255324735.00000000059E3000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.comAY
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251427214.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251284857.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251284857.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krF
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251427214.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251543225.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251636325.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krim2NV
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251427214.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krn-u
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254128575.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254203350.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254045934.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254268609.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com6Yv
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254128575.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254203350.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254045934.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comslnt
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260105188.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259882671.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260184607.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260075643.00000000059E8000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257258739.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259966998.00000000059E7000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260022941.00000000059E8000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257258739.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257331089.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257396363.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257470233.00000000059E1000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de1Yq
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260105188.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259882671.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260184607.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260075643.00000000059E8000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259966998.00000000059E7000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260022941.00000000059E8000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deHY
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257258739.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257331089.00000000059E1000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deld
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257560261.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257258739.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257331089.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257691635.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257396363.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257470233.00000000059E1000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deoimY
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260105188.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259882671.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260075643.00000000059E8000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259966998.00000000059E7000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260022941.00000000059E8000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.depY0
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253107340.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253107340.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn#
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253553298.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253396882.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253279851.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253704993.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253177386.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253107340.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253641393.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253588617.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253223941.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cncom
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253279851.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253177386.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253107340.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253223941.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnd
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253107340.00000000059DB000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnk
      Source: unknownDNS traffic detected: queries for: 55098hustlenow.hopto.org
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.289955741.0000000000DFB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
      Source: RegSvcs.exe, 0000000A.00000002.522152896.00000000041A9000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41b4c55.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.5a70000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.5a74629.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41b062c.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41b062c.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.5a70000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41ab7f6.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000A.00000002.517211527.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.524096119.0000000005A70000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.522152896.00000000041A9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.285492337.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.287299484.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.286086026.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.286443560.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.291731877.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: TT#U007e)9383763563783039847949N.cmd.exe PID: 6280, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6956, type: MEMORYSTR

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 10.2.RegSvcs.exe.41b4c55.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.RegSvcs.exe.5a70000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.RegSvcs.exe.5a74629.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.RegSvcs.exe.41b062c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.RegSvcs.exe.59d0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.RegSvcs.exe.41b062c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.RegSvcs.exe.5a70000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.RegSvcs.exe.41ab7f6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.RegSvcs.exe.41ab7f6.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.RegSvcs.exe.31c0654.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000002.517211527.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000002.517211527.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000002.523432863.00000000059D0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000002.524096119.0000000005A70000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000002.522152896.00000000041A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000000.285492337.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000000.285492337.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000000.287299484.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000000.287299484.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000000.286086026.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000000.286086026.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000000.286443560.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000000.286443560.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.291731877.0000000003A19000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.291731877.0000000003A19000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: TT#U007e)9383763563783039847949N.cmd.exe PID: 6280, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: TT#U007e)9383763563783039847949N.cmd.exe PID: 6280, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: RegSvcs.exe PID: 6956, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: RegSvcs.exe PID: 6956, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: TT#U007e)9383763563783039847949N.cmd.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
      Source: 10.2.RegSvcs.exe.41b4c55.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.RegSvcs.exe.41b4c55.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.RegSvcs.exe.5a70000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.RegSvcs.exe.5a70000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.RegSvcs.exe.5a74629.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.RegSvcs.exe.5a74629.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.RegSvcs.exe.41b062c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.RegSvcs.exe.41b062c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.RegSvcs.exe.59d0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.RegSvcs.exe.59d0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.RegSvcs.exe.41b062c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.RegSvcs.exe.41b062c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.RegSvcs.exe.5a70000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.RegSvcs.exe.5a70000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.RegSvcs.exe.41ab7f6.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.RegSvcs.exe.41ab7f6.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.RegSvcs.exe.41ab7f6.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.RegSvcs.exe.31c0654.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000002.517211527.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000002.517211527.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000002.523432863.00000000059D0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000002.523432863.00000000059D0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000002.524096119.0000000005A70000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000002.524096119.0000000005A70000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000002.522152896.00000000041A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000000.285492337.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000000.285492337.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000000.287299484.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000000.287299484.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000000.286086026.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000000.286086026.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000000.286443560.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000000.286443560.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.291731877.0000000003A19000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.291731877.0000000003A19000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: TT#U007e)9383763563783039847949N.cmd.exe PID: 6280, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: TT#U007e)9383763563783039847949N.cmd.exe PID: 6280, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: RegSvcs.exe PID: 6956, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: RegSvcs.exe PID: 6956, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeCode function: 0_2_00DE8188
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeCode function: 0_2_00DE6A08
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeCode function: 0_2_00DE6DAA
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeCode function: 0_2_00DE7E60
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0314E471
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0314E480
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0314BBD4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_06BE0040
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.289955741.0000000000DFB000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs TT#U007e)9383763563783039847949N.cmd.exe
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.289105536.00000000006C6000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameResourceExposureAttribu.exe8 vs TT#U007e)9383763563783039847949N.cmd.exe
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295565812.00000000089D0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs TT#U007e)9383763563783039847949N.cmd.exe
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.291731877.0000000003A19000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dllF vs TT#U007e)9383763563783039847949N.cmd.exe
      Source: TT#U007e)9383763563783039847949N.cmd.exeBinary or memory string: OriginalFilenameResourceExposureAttribu.exe8 vs TT#U007e)9383763563783039847949N.cmd.exe
      Source: TT#U007e)9383763563783039847949N.cmd.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: wUDpvSE.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: TT#U007e)9383763563783039847949N.cmd.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: wUDpvSE.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: TT#U007e)9383763563783039847949N.cmd.exeVirustotal: Detection: 30%
      Source: TT#U007e)9383763563783039847949N.cmd.exeReversingLabs: Detection: 31%
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeFile read: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeJump to behavior
      Source: TT#U007e)9383763563783039847949N.cmd.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe "C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe"
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wUDpvSE.exe
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wUDpvSE" /XML "C:\Users\user\AppData\Local\Temp\tmp1EE6.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp3840.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp42FF.tmp
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe 0
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wUDpvSE.exe
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wUDpvSE" /XML "C:\Users\user\AppData\Local\Temp\tmp1EE6.tmp
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp3840.tmp
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp42FF.tmp
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeFile created: C:\Users\user\AppData\Roaming\wUDpvSE.exeJump to behavior
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeFile created: C:\Users\user\AppData\Local\Temp\tmp1EE6.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@21/18@12/1
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: 10.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 10.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 10.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 10.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 10.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 10.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 10.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 10.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 10.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 10.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 10.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 10.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6892:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6408:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6344:120:WilError_01
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeMutant created: \Sessions\1\BaseNamedObjects\RQUxguJRs
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6936:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6780:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6400:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{423b1032-a4e4-4490-8998-68a509cab40d}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4352:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
      Source: 10.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 10.0.RegSvcs.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 10.0.RegSvcs.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 10.0.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 10.0.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 10.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 10.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 10.0.RegSvcs.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 10.0.RegSvcs.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: TT#U007e)9383763563783039847949N.cmd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: TT#U007e)9383763563783039847949N.cmd.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 0000000A.00000003.292607922.0000000001506000.00000004.00000001.sdmp, dhcpmon.exe, 00000018.00000000.306676760.0000000000662000.00000002.00020000.sdmp, dhcpmon.exe, 0000001B.00000000.312590099.0000000000B12000.00000002.00020000.sdmp, dhcpmon.exe.10.dr
      Source: Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe, 0000001B.00000000.312590099.0000000000B12000.00000002.00020000.sdmp, dhcpmon.exe.10.dr

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: TT#U007e)9383763563783039847949N.cmd.exe, u0005u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: wUDpvSE.exe.0.dr, u0005u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.640000.0.unpack, u0005u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.0.TT#U007e)9383763563783039847949N.cmd.exe.640000.0.unpack, u0005u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.RegSvcs.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.RegSvcs.exe.400000.2.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.RegSvcs.exe.400000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.RegSvcs.exe.400000.3.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeCode function: 0_2_0064E11B push esp; iretd
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeCode function: 0_2_00DEE268 push eax; iretd
      Source: initial sampleStatic PE information: section name: .text entropy: 7.78329348907
      Source: initial sampleStatic PE information: section name: .text entropy: 7.78329348907
      Source: 10.0.RegSvcs.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 10.0.RegSvcs.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 10.0.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 10.0.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 10.0.RegSvcs.exe.400000.2.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 10.0.RegSvcs.exe.400000.2.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 10.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 10.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 10.0.RegSvcs.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 10.0.RegSvcs.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 10.0.RegSvcs.exe.400000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 10.0.RegSvcs.exe.400000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeFile created: C:\Users\user\AppData\Roaming\wUDpvSE.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wUDpvSE" /XML "C:\Users\user\AppData\Local\Temp\tmp1EE6.tmp

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Yara detected AntiVM3Show sources
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.2a40290.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.290665928.0000000002B05000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.290448066.0000000002A11000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: TT#U007e)9383763563783039847949N.cmd.exe PID: 6280, type: MEMORYSTR
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290448066.0000000002A11000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290665928.0000000002B05000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290448066.0000000002A11000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290665928.0000000002B05000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe TID: 6284Thread sleep time: -37969s >= -30000s
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe TID: 6304Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6952Thread sleep time: -8301034833169293s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5672Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 404Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6647
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2042
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4727
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4678
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: foregroundWindowGot 735
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeThread delayed: delay time: 37969
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290665928.0000000002B05000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290665928.0000000002B05000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290665928.0000000002B05000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: RegSvcs.exe, 0000000A.00000002.525006496.0000000006960000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290665928.0000000002B05000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Writes to foreign memory regionsShow sources
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 420000
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 422000
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: EAC008
      Allocates memory in foreign processesShow sources
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and write
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
      Adds a directory exclusion to Windows DefenderShow sources
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wUDpvSE.exe
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wUDpvSE.exe
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wUDpvSE.exe
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wUDpvSE" /XML "C:\Users\user\AppData\Local\Temp\tmp1EE6.tmp
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp3840.tmp
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp42FF.tmp
      Source: RegSvcs.exe, 0000000A.00000002.519877146.0000000001B10000.00000002.00020000.sdmpBinary or memory string: uProgram Manager
      Source: RegSvcs.exe, 0000000A.00000002.520920561.0000000003286000.00000004.00000001.sdmp, RegSvcs.exe, 0000000A.00000002.520732365.00000000031BB000.00000004.00000001.sdmp, RegSvcs.exe, 0000000A.00000002.524799513.000000000661B000.00000004.00000010.sdmp, RegSvcs.exe, 0000000A.00000002.525199162.0000000006FAD000.00000004.00000010.sdmp, RegSvcs.exe, 0000000A.00000002.522023000.00000000035AE000.00000004.00000001.sdmp, RegSvcs.exe, 0000000A.00000002.525172346.0000000006E6D000.00000004.00000010.sdmp, RegSvcs.exe, 0000000A.00000002.525108941.0000000006B9C000.00000004.00000010.sdmp, RegSvcs.exe, 0000000A.00000002.524928249.000000000684D000.00000004.00000010.sdmpBinary or memory string: Program Manager
      Source: RegSvcs.exe, 0000000A.00000002.519877146.0000000001B10000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: RegSvcs.exe, 0000000A.00000002.519877146.0000000001B10000.00000002.00020000.sdmpBinary or memory string: Progman
      Source: RegSvcs.exe, 0000000A.00000002.519877146.0000000001B10000.00000002.00020000.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41b4c55.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.5a70000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.5a74629.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41b062c.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41b062c.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.5a70000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41ab7f6.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000A.00000002.517211527.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.524096119.0000000005A70000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.522152896.00000000041A9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.285492337.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.287299484.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.286086026.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.286443560.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.291731877.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: TT#U007e)9383763563783039847949N.cmd.exe PID: 6280, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6956, type: MEMORYSTR

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.291731877.0000000003A19000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RegSvcs.exe, 0000000A.00000002.520732365.00000000031BB000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RegSvcs.exe, 0000000A.00000002.520732365.00000000031BB000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: RegSvcs.exe, 0000000A.00000002.517211527.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RegSvcs.exe, 0000000A.00000002.522152896.00000000041A9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RegSvcs.exe, 0000000A.00000002.522152896.00000000041A9000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41b4c55.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.5a70000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.5a74629.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41b062c.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41b062c.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.5a70000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.41ab7f6.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3af8c90.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.TT#U007e)9383763563783039847949N.cmd.exe.3b2b8b0.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000A.00000002.517211527.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.524096119.0000000005A70000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.522152896.00000000041A9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.285492337.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.287299484.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.286086026.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.286443560.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.291731877.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: TT#U007e)9383763563783039847949N.cmd.exe PID: 6280, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6956, type: MEMORYSTR

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection312Masquerading2Input Capture21Security Software Discovery21Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools11LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection312NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 552771 Sample: TT#U007e)938376356378303984... Startdate: 13/01/2022 Architecture: WINDOWS Score: 100 58 55098hustlenow.hopto.org 2->58 62 Found malware configuration 2->62 64 Malicious sample detected (through community Yara rule) 2->64 66 Antivirus detection for URL or domain 2->66 68 16 other signatures 2->68 9 TT#U007e)9383763563783039847949N.cmd.exe 7 2->9         started        13 RegSvcs.exe 2 2->13         started        15 dhcpmon.exe 2->15         started        17 dhcpmon.exe 2->17         started        signatures3 process4 file5 50 C:\Users\user\AppData\Roaming\wUDpvSE.exe, PE32 9->50 dropped 52 C:\Users\user\...\wUDpvSE.exe:Zone.Identifier, ASCII 9->52 dropped 54 C:\Users\user\AppData\Local\...\tmp1EE6.tmp, XML 9->54 dropped 56 TT#U007e)938376356...847949N.cmd.exe.log, ASCII 9->56 dropped 72 Uses schtasks.exe or at.exe to add and modify task schedules 9->72 74 Writes to foreign memory regions 9->74 76 Allocates memory in foreign processes 9->76 78 2 other signatures 9->78 19 RegSvcs.exe 1 11 9->19         started        24 powershell.exe 25 9->24         started        26 schtasks.exe 1 9->26         started        28 conhost.exe 13->28         started        30 conhost.exe 15->30         started        32 conhost.exe 17->32         started        signatures6 process7 dnsIp8 60 55098hustlenow.hopto.org 185.140.53.130, 49755, 49758, 49759 DAVID_CRAIGGG Sweden 19->60 46 C:\Users\user\AppData\Roaming\...\run.dat, data 19->46 dropped 48 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->48 dropped 70 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->70 34 schtasks.exe 1 19->34         started        36 schtasks.exe 1 19->36         started        38 conhost.exe 24->38         started        40 conhost.exe 26->40         started        file9 signatures10 process11 process12 42 conhost.exe 34->42         started        44 conhost.exe 36->44         started       

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      TT#U007e)9383763563783039847949N.cmd.exe31%VirustotalBrowse
      TT#U007e)9383763563783039847949N.cmd.exe32%ReversingLabsByteCode-MSIL.Backdoor.NanoBot
      TT#U007e)9383763563783039847949N.cmd.exe100%AviraHEUR/AGEN.1211287
      TT#U007e)9383763563783039847949N.cmd.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\wUDpvSE.exe100%AviraHEUR/AGEN.1211287
      C:\Users\user\AppData\Roaming\wUDpvSE.exe100%Joe Sandbox ML
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs
      C:\Users\user\AppData\Roaming\wUDpvSE.exe32%ReversingLabsByteCode-MSIL.Backdoor.NanoBot

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      10.0.RegSvcs.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      10.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      10.0.RegSvcs.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      0.2.TT#U007e)9383763563783039847949N.cmd.exe.640000.0.unpack100%AviraHEUR/AGEN.1211287Download File
      10.2.RegSvcs.exe.5a70000.6.unpack100%AviraTR/NanoCore.fadteDownload File
      0.0.TT#U007e)9383763563783039847949N.cmd.exe.640000.0.unpack100%AviraHEUR/AGEN.1211287Download File
      10.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      10.0.RegSvcs.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      10.0.RegSvcs.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

      Domains

      SourceDetectionScannerLabelLink
      55098hustlenow.hopto.org1%VirustotalBrowse

      URLs

      SourceDetectionScannerLabelLink
      http://www.galapagosdesign.com/staff/dennis.htmsKi0%Avira URL Cloudsafe
      http://www.urwpp.de1Yq0%Avira URL Cloudsafe
      http://www.sajatypeworks.comiviV0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.carterandcone.com#0%Avira URL Cloudsafe
      http://www.carterandcone.comoup0%Avira URL Cloudsafe
      http://www.urwpp.deld0%Avira URL Cloudsafe
      http://www.founder.com.cn/cnark0%Avira URL Cloudsafe
      http://www.tiro.com0%URL Reputationsafe
      55098hustlenow.hopto.org100%Avira URL Cloudmalware
      http://www.sakkal.comAY0%Avira URL Cloudsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.carterandcone.com0%URL Reputationsafe
      http://www.carterandcone.comintPM50%Avira URL Cloudsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.urwpp.deoimY0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.carterandcone.comngH0%Avira URL Cloudsafe
      http://www.zhongyicts.com.cncom0%Avira URL Cloudsafe
      http://www.zhongyicts.com.cn#0%Avira URL Cloudsafe
      http://www.carterandcone.comEac0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.ascendercorp.com/typedesigners.html-KS0%Avira URL Cloudsafe
      http://www.sandoll.co.krF0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.urwpp.de0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.carterandcone.comic0%URL Reputationsafe
      http://www.carterandcone.como.Z0%Avira URL Cloudsafe
      http://www.carterandcone.comtig0%URL Reputationsafe
      http://www.urwpp.depY00%Avira URL Cloudsafe
      185.140.53.1300%Avira URL Cloudsafe
      http://www.carterandcone.comexc0%URL Reputationsafe
      http://www.carterandcone.comf0%URL Reputationsafe
      http://www.carterandcone.comd0%URL Reputationsafe
      http://www.fontbureau.comH0%URL Reputationsafe
      http://www.tiro.comslnt0%URL Reputationsafe
      http://www.founder.com.cn/cn/D0%Avira URL Cloudsafe
      http://www.sandoll.co.krim2NV0%Avira URL Cloudsafe
      http://www.tiro.com6Yv0%Avira URL Cloudsafe
      http://www.carterandcone.comlt0%URL Reputationsafe
      http://www.sajatypeworks.comGD0%Avira URL Cloudsafe
      http://www.carterandcone.compt0%Avira URL Cloudsafe
      http://www.monotype.FM0%Avira URL Cloudsafe
      http://www.carterandcone.comi0%URL Reputationsafe
      http://www.carterandcone.comh0%URL Reputationsafe
      http://www.carterandcone.comTC8Zk0%Avira URL Cloudsafe
      http://www.fontbureau.comc0%Avira URL Cloudsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.carterandcone.comk0%URL Reputationsafe
      http://www.zhongyicts.com.cnk0%URL Reputationsafe
      http://www.founder.com.cn/cn/0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.zhongyicts.com.cnd0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.urwpp.deHY0%Avira URL Cloudsafe
      http://www.sandoll.co.krn-u0%URL Reputationsafe
      http://www.founder.com.cn/cnof0%Avira URL Cloudsafe
      http://www.carterandcone.comark0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn#0%URL Reputationsafe
      http://www.fontbureau.comiona;0%Avira URL Cloudsafe
      http://www.carterandcone.como.4_0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      55098hustlenow.hopto.org
      185.140.53.130
      truetrueunknown

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      55098hustlenow.hopto.orgtrue
      • Avira URL Cloud: malware
      unknown
      185.140.53.130true
      • Avira URL Cloud: safe
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://www.galapagosdesign.com/staff/dennis.htmsKiTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261890230.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261665039.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261798424.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261751120.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261961584.00000000059DB000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.fontbureau.com/designersGTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
        high
        http://www.urwpp.de1YqTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257258739.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257331089.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257396363.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257470233.00000000059E1000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.sajatypeworks.comiviVTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.248588328.00000000059C2000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designers/?TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
          high
          http://www.fontbureau.com/designersLTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258520673.00000000059DB000.00000004.00000001.sdmpfalse
            high
            http://www.founder.com.cn/cn/bTheTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.carterandcone.com#TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253553298.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253396882.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.carterandcone.comoupTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254545994.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254128575.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254203350.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254045934.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254422402.00000000059E4000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254268609.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254349036.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254493580.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254438755.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254578361.00000000059DB000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.urwpp.deldTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257258739.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257331089.00000000059E1000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designers?TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
              high
              http://www.founder.com.cn/cnarkTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252701018.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252987912.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252558373.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252899088.00000000059E4000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252654866.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252297737.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252437061.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252807976.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252095130.00000000059DB000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.tiro.comTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.sakkal.comAYTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255324735.00000000059E3000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designersTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258049572.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258653845.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.265417311.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.265594159.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259615165.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259511953.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.265557060.00000000059DB000.00000004.00000001.sdmpfalse
                high
                http://www.goodfont.co.krTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251427214.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251543225.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.carterandcone.comTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253588617.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253223941.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.carterandcone.comintPM5TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253279851.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253177386.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253223941.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.sajatypeworks.comTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.248588328.00000000059C2000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.typography.netDTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn/cTheTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.urwpp.deoimYTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257560261.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257258739.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257331089.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257691635.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257396363.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257470233.00000000059E1000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.galapagosdesign.com/staff/dennis.htmTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263966160.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263481283.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262892359.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263047005.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264942059.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262567128.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262651157.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263798575.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263174369.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262080103.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.265123364.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261890230.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262722697.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264511515.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264282825.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264576153.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261665039.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262822420.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264168250.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264402497.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262345506.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262472848.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264643079.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264819301.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263289261.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264745512.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262958425.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263575655.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263674251.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264890795.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261798424.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.263384878.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262196771.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.265046921.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261751120.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.264690366.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.262266305.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.261961584.00000000059DB000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://fontfabrik.comTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249304688.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249546896.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249369869.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249269040.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249512717.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249418057.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249341299.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.249321113.00000000059DB000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.carterandcone.comngHTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.zhongyicts.com.cncomTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253553298.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253396882.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253279851.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253704993.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253177386.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253107340.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253641393.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253588617.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253223941.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.zhongyicts.com.cn#TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253107340.00000000059DB000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.carterandcone.comEacTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.galapagosdesign.com/DPleaseTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.ascendercorp.com/typedesigners.htmlTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255594967.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255372335.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255496741.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255324735.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255846246.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255935438.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255251897.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255667936.00000000059E3000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255752748.00000000059E3000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fonts.comTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                  high
                  http://www.sandoll.co.krTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251427214.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251284857.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.ascendercorp.com/typedesigners.html-KSTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.255251897.00000000059E3000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.sandoll.co.krFTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251284857.00000000059DB000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.urwpp.deDPleaseTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designerszTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258097151.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258049572.00000000059DB000.00000004.00000001.sdmpfalse
                    high
                    http://www.urwpp.deTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260105188.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259882671.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260184607.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260075643.00000000059E8000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257258739.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259966998.00000000059E7000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260022941.00000000059E8000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.zhongyicts.com.cnTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253107340.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290448066.0000000002A11000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290665928.0000000002B05000.00000004.00000001.sdmpfalse
                      high
                      http://www.fontbureau.com/designers/#TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257560261.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257934659.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258000234.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257890841.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257691635.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257768686.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258049572.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257803673.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257844080.00000000059DB000.00000004.00000001.sdmpfalse
                        high
                        http://www.sakkal.comTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comicTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253553298.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.como.ZTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254128575.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254045934.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253704993.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253641393.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.carterandcone.comtigTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.depY0TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260105188.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259882671.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260075643.00000000059E8000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259966998.00000000059E7000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260022941.00000000059E8000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.apache.org/licenses/LICENSE-2.0TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                          high
                          http://www.carterandcone.comexcTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253553298.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                            high
                            http://www.carterandcone.comfTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254128575.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254045934.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comdTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253553298.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253396882.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254128575.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254203350.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254045934.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254422402.00000000059E4000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253704993.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254268609.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254349036.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253641393.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254438755.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253588617.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comHTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290348711.0000000001237000.00000004.00000040.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.tiro.comslntTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254128575.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254203350.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254045934.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/DTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252558373.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252297737.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252437061.00000000059DB000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.sandoll.co.krim2NVTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251427214.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251543225.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251636325.00000000059DB000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.tiro.com6YvTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254128575.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254203350.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254045934.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254268609.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designersIOTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257691635.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257768686.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257803673.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257844080.00000000059DB000.00000004.00000001.sdmpfalse
                              high
                              http://www.carterandcone.comltTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253553298.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253396882.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253279851.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253704993.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253641393.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253588617.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sajatypeworks.comGDTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.248588328.00000000059C2000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.carterandcone.comptTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253553298.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253704993.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253641393.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253588617.00000000059DB000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.monotype.FMTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257560261.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258097151.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257934659.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257258739.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.256844923.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258000234.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257331089.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257890841.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257093466.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257691635.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258318684.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257768686.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.256992134.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258232502.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258149491.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258049572.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.256782660.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.256920302.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257396363.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257208790.00000000059E1000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257803673.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257844080.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257470233.00000000059E1000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.com/designers/cabarga.htmleTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259494683.00000000059FE000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259592103.00000000059FE000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259425766.00000000059FE000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259476036.00000000059FE000.00000004.00000001.sdmpfalse
                                high
                                http://www.carterandcone.comiTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253279851.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253223941.00000000059DB000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comhTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253279851.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253223941.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comTC8ZkTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.comcTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290348711.0000000001237000.00000004.00000040.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comlTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comkTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.254045934.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253987229.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnkTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253107340.00000000059DB000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cn/TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252297737.00000000059DB000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cnTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252095130.00000000059DB000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-jones.htmlTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.258477171.00000000059DB000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.zhongyicts.com.cndTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253279851.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253177386.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253107340.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253223941.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259425766.00000000059FE000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259476036.00000000059FE000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.jiyu-kobo.co.jp/TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.urwpp.deHYTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260105188.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259882671.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260184607.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260075643.00000000059E8000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.259966998.00000000059E7000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.260022941.00000000059E8000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designers8TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.295196219.0000000006BD2000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.sandoll.co.krn-uTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251427214.00000000059DB000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cnofTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252701018.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252987912.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252558373.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252899088.00000000059E4000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252654866.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252297737.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252437061.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252807976.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252095130.00000000059DB000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.carterandcone.comarkTT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253482384.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253340411.00000000059DB000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.fontbureau.com/designers/TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.257560261.00000000059E1000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cn#TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.251951595.00000000059E0000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.252023972.00000000059E4000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.comiona;TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000002.290348711.0000000001237000.00000004.00000040.sdmpfalse
                                          • Avira URL Cloud: safe
                                          low
                                          http://www.carterandcone.como.4_TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253807964.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253704993.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253890150.00000000059DB000.00000004.00000001.sdmp, TT#U007e)9383763563783039847949N.cmd.exe, 00000000.00000003.253932756.00000000059DB000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          low

                                          Contacted IPs

                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs

                                          Public

                                          IPDomainCountryFlagASNASN NameMalicious
                                          185.140.53.130
                                          55098hustlenow.hopto.orgSweden
                                          209623DAVID_CRAIGGGtrue

                                          General Information

                                          Joe Sandbox Version:34.0.0 Boulder Opal
                                          Analysis ID:552771
                                          Start date:13.01.2022
                                          Start time:18:02:36
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 11m 59s
                                          Hypervisor based Inspection enabled:false
                                          Report type:light
                                          Sample file name:TT#U007e)9383763563783039847949N.cmd.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:38
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.evad.winEXE@21/18@12/1
                                          EGA Information:
                                          • Successful, ratio: 80%
                                          HDC Information:
                                          • Successful, ratio: 18.4% (good quality ratio 10.1%)
                                          • Quality average: 36.7%
                                          • Quality standard deviation: 40%
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 0
                                          • Number of non-executed functions: 0
                                          Cookbook Comments:
                                          • Adjust boot time
                                          • Enable AMSI
                                          • Found application associated with file extension: .exe
                                          Warnings:
                                          Show All
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                          • TCP Packets have been reduced to 100
                                          • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                          • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                          • Execution Graph export aborted for target dhcpmon.exe, PID 3748 because it is empty
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.

                                          Simulations

                                          Behavior and APIs

                                          TimeTypeDescription
                                          18:03:45API Interceptor2x Sleep call for process: TT#U007e)9383763563783039847949N.cmd.exe modified
                                          18:03:50API Interceptor32x Sleep call for process: powershell.exe modified
                                          18:03:57AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                          18:04:00Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" s>$(Arg0)
                                          18:04:01API Interceptor811x Sleep call for process: RegSvcs.exe modified
                                          18:04:02Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)

                                          Joe Sandbox View / Context

                                          IPs

                                          No context

                                          Domains

                                          No context

                                          ASN

                                          No context

                                          JA3 Fingerprints

                                          No context

                                          Dropped Files

                                          No context

                                          Created / dropped Files

                                          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):45152
                                          Entropy (8bit):6.149629800481177
                                          Encrypted:false
                                          SSDEEP:768:bBbSoy+SdIBf0k2dsYyV6Iq87PiU9FViaLmf:EoOIBf0ddsYy8LUjVBC
                                          MD5:2867A3817C9245F7CF518524DFD18F28
                                          SHA1:D7BA2A111CEDD5BF523224B3F1CFE58EEC7C2FDC
                                          SHA-256:43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                                          SHA-512:7D3D3DBB42B7966644D716AA9CBC75327B2ACB02E43C61F1DAD4AFE5521F9FE248B33347DFE15B637FB33EB97CDB322BCAEAE08BAE3F2FD863A9AD9B3A4D6B42
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: Metadefender, Detection: 0%, Browse
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...zX.Z..............0..d..........V.... ........@.. ..............................."....`.....................................O.......8............r..`>.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:modified
                                          Size (bytes):142
                                          Entropy (8bit):5.090621108356562
                                          Encrypted:false
                                          SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                          MD5:8C0458BB9EA02D50565175E38D577E35
                                          SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                          SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                          SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                          Malicious:false
                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TT#U007e)9383763563783039847949N.cmd.exe.log
                                          Process:C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:modified
                                          Size (bytes):1310
                                          Entropy (8bit):5.345651901398759
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x847mE4P:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzQ
                                          MD5:A9EFF9253CAF99EC8665E41D736DDAED
                                          SHA1:D95BB4ABC856D774DA4602A59DE252B4BF560530
                                          SHA-256:DBC637B33F1F3CD1AB40AFED23F94C4571CA43621EBB52C5DC267DBDC52D4783
                                          SHA-512:96B67A84B750589BDB758224641065919F34BBF02BB286B9F5D566B48965A0E38FB88308B61351A6E11C46B76BFEC370FBC8B978A9F0F07A847567172D5CA5F3
                                          Malicious:true
                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                                          Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:modified
                                          Size (bytes):142
                                          Entropy (8bit):5.090621108356562
                                          Encrypted:false
                                          SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                          MD5:8C0458BB9EA02D50565175E38D577E35
                                          SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                          SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                          SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                          Malicious:false
                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                          C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):22304
                                          Entropy (8bit):5.602293803799045
                                          Encrypted:false
                                          SSDEEP:384:7tCDvq0SjiDhIZPlF+X0SBKncjultIC77Y9ghSJ3x6T1MavZlbAV70W0CS5ZBDIn:E1I5lQ04KcCltdfhcAC+fw8V8
                                          MD5:FA78CE6AE356D064695AF2BDD7341D32
                                          SHA1:0DDB53FEE435A0223E65E93D76CCEEC6A080B47D
                                          SHA-256:14AC2905BBBE4829DB4243E4F308740D102C37FB414CFD0505CE50244C893B64
                                          SHA-512:E762291E1F8FB2913028B6A2C2D57F25C098699701BC1FE4B24354FC48CDB0555E03699B08F9C99C71352F3CAE58FF9531FD9D0369F73EB6DCF00F29B41FC2CF
                                          Malicious:false
                                          Preview: @...e...................h.j...........U...H..........@..........H...............<@.^.L."My...:R..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jj1by3vo.fw0.ps1
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:very short file (no magic)
                                          Category:dropped
                                          Size (bytes):1
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3:U:U
                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                          Malicious:false
                                          Preview: 1
                                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n3o5mldn.ubu.psm1
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:very short file (no magic)
                                          Category:dropped
                                          Size (bytes):1
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3:U:U
                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                          Malicious:false
                                          Preview: 1
                                          C:\Users\user\AppData\Local\Temp\tmp1EE6.tmp
                                          Process:C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe
                                          File Type:XML 1.0 document, ASCII text
                                          Category:dropped
                                          Size (bytes):1610
                                          Entropy (8bit):5.129004283554135
                                          Encrypted:false
                                          SSDEEP:24:2di4+S2qh/dp1Kd+y1modHUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtDVxvn:cgeHMYrFdOFzOzN33ODOiDdKrsuTnv
                                          MD5:A24B8E375AAA02A354B2941D3A96C606
                                          SHA1:8848F86B51434884FEBF51349E6C24A6265770C0
                                          SHA-256:446A5BC1AFF0C829A4F1DAD5B0855A172AB5164021B8FB67EE764A95D595CBF0
                                          SHA-512:34DD1225156DC0604532C84C1009BC462CFBC6B33D9AC61F71946502F4C2DCC77E80DA1C2947C13F620328C9E3C7424378EC2AB91037D3EA92BC7A78F66277AE
                                          Malicious:true
                                          Preview: <?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvai
                                          C:\Users\user\AppData\Local\Temp\tmp3840.tmp
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1320
                                          Entropy (8bit):5.135668813522653
                                          Encrypted:false
                                          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mXxtn:cbk4oL600QydbQxIYODOLedq3ZXj
                                          MD5:8CAD1B41587CED0F1E74396794F31D58
                                          SHA1:11054BF74FCF5E8E412768035E4DAE43AA7B710F
                                          SHA-256:3086D914F6B23268F8A12CB1A05516CD5465C2577E1D1E449F1B45C8E5E8F83C
                                          SHA-512:99C2EF89029DE51A866DF932841684B7FC912DF21E10E2DD0D09E400203BBDC6CBA6319A31780B7BF8B286D2CEA8EA3FC7D084348BF2F002AB4F5A34218CCBEF
                                          Malicious:false
                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                          C:\Users\user\AppData\Local\Temp\tmp42FF.tmp
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1310
                                          Entropy (8bit):5.109425792877704
                                          Encrypted:false
                                          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                          MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                          SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                          SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                          SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                          Malicious:false
                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):8
                                          Entropy (8bit):3.0
                                          Encrypted:false
                                          SSDEEP:3:Py8n:d
                                          MD5:612A3AAA3EB1E3046475CE7469453925
                                          SHA1:FB1074A68885D040D99F16FE7253FEA92EA01897
                                          SHA-256:E5D20EEFDF29305CFF4161CDE69900F2141E017A5E1B5B01DB8F342E513E16D9
                                          SHA-512:A793B1A88A446ADA623B5878B0F12B2BBA83C3C29976873313D9BCC1D9B5D8530647E97C60BB6825B759B36CA3E2497FFD7C8C2B381A6A4E17E91741181E8DB0
                                          Malicious:true
                                          Preview: .j.....H
                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):57
                                          Entropy (8bit):4.830795005765378
                                          Encrypted:false
                                          SSDEEP:3:oMty8WddSWA1KMNn:oMLW6WA1j
                                          MD5:08E799E8E9B4FDA648F2500A40A11933
                                          SHA1:AC76B5E20DED247803448A2F586731ED7D84B9F3
                                          SHA-256:D46E34924067EB071D1F031C0BC015F4B711EDCE64D8AE00F24F29E73ECB71DB
                                          SHA-512:5C5701A86156D573BE274E73615FD6236AC89630714863A4CB2639EEC8EC1BE746839EBF8A9AEBA0A9BE326AF6FA02D8F9BD7A93D3FFB139BADE945572DF5FE9
                                          Malicious:false
                                          Preview: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          C:\Users\user\AppData\Roaming\wUDpvSE.exe
                                          Process:C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):636416
                                          Entropy (8bit):7.184563052963555
                                          Encrypted:false
                                          SSDEEP:12288:s0DK777777777777SfDTaWZq81e9infTaO5MgzV9MmvP:dK777777777777SfPaWZReMnfTPPzVx
                                          MD5:398E8790480F654B4D677847BA454560
                                          SHA1:5CF48784813136868BDF1D995500056EAEB702A2
                                          SHA-256:C839234F96D6CE5D83F511FF6AA0D0AFC7A680BC478C81416592C981BB066058
                                          SHA-512:BDFFC299BEA5E8AD084526B6430E934403C4A5C59710CE6222ED5A7EA211FC07BAFD507415166658538DCBDE2DC8AAB90696D2E64E3736CB071BBC3E669DEB1F
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 32%
                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...45.a.................2...........P... ...`....@.. ....................................@..................................P..W....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc..............................@..B.................P......H.......P"..H.......-...$^..,...........................................z.(......}.....(....o....}....*..0...........{............3.....(.....*..................0...........{......,....f.........}......}......}.......s....o....}.......}....8......{....o....}......{....}......}.............}.....{........Y}.....{....-...+H.{........{....X.{....X .;.|.{....Xa}......}.....{....o....:q....(....+..(........}.........(......*................n..}.....{....,..{....oc...*..{....*.s..
                                          C:\Users\user\AppData\Roaming\wUDpvSE.exe:Zone.Identifier
                                          Process:C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):26
                                          Entropy (8bit):3.95006375643621
                                          Encrypted:false
                                          SSDEEP:3:ggPYV:rPYV
                                          MD5:187F488E27DB4AF347237FE461A079AD
                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                          Malicious:true
                                          Preview: [ZoneTransfer]....ZoneId=0
                                          C:\Users\user\Documents\20220113\PowerShell_transcript.377142.s88OTTbR.20220113180347.txt
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):5817
                                          Entropy (8bit):5.382970840664857
                                          Encrypted:false
                                          SSDEEP:96:BZZ6KN2qDo1Z9ZW6KN2qDo1ZxkusjZW6KN2qDo1ZAp88KZ1:p
                                          MD5:22D5AAB9A5CE9A995C2975326DC44122
                                          SHA1:1FA995ACF40D3C05767A4BF3BCF8C7B2D5B0FD67
                                          SHA-256:16A3BDE7DEA8D671FA6AE99C54C5E584324682C862ADFC02CDCDF6C6FEAA87EB
                                          SHA-512:F118EBBAA330E9416C67636E7BBBA3D3C55B3B2E1671CCDE308330E415EB185EE7EE1A47241BCDE863EA1D914C7733C3BC8BDDBC0AD5555435E62734E6A10F2A
                                          Malicious:false
                                          Preview: .**********************..Windows PowerShell transcript start..Start time: 20220113180350..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 377142 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\wUDpvSE.exe..Process ID: 6768..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220113180350..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\wUDpvSE.exe..**********************..Windows PowerShell transcript start..Start time: 20220113180735..Username: computer\user..RunAs User: DESKTO
                                          \Device\ConDrv
                                          Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1141
                                          Entropy (8bit):4.44831826838854
                                          Encrypted:false
                                          SSDEEP:24:zKLXkb4DObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0b4DQntKKH1MqJC
                                          MD5:1AEB3A784552CFD2AEDEDC1D43A97A4F
                                          SHA1:804286AB9F8B3DE053222826A69A7CDA3492411A
                                          SHA-256:0BC438F4B1208E1390C12D375B6CBB08BF47599D1F24BD07799BB1DF384AA293
                                          SHA-512:5305059BA86D5C2185E590EC036044B2A17ED9FD9863C2E3C7E7D8035EF0C79E53357AF5AE735F7D432BC70156D4BD3ACB42D100CFB05C2FB669EA22368F1415
                                          Malicious:false
                                          Preview: Microsoft (R) .NET Framework Services Installation Utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c

                                          Static File Info

                                          General

                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.184563052963555
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          • DOS Executable Generic (2002/1) 0.01%
                                          File name:TT#U007e)9383763563783039847949N.cmd.exe
                                          File size:636416
                                          MD5:398e8790480f654b4d677847ba454560
                                          SHA1:5cf48784813136868bdf1d995500056eaeb702a2
                                          SHA256:c839234f96d6ce5d83f511ff6aa0d0afc7a680bc478c81416592c981bb066058
                                          SHA512:bdffc299bea5e8ad084526b6430e934403c4a5c59710ce6222ed5a7ea211fc07bafd507415166658538dcbde2dc8aab90696d2e64e3736cb071bbc3e669deb1f
                                          SSDEEP:12288:s0DK777777777777SfDTaWZq81e9infTaO5MgzV9MmvP:dK777777777777SfPaWZReMnfTPPzVx
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...45.a.................2...........P... ...`....@.. ....................................@................................

                                          File Icon

                                          Icon Hash:64cce4f4f4e4dcd4

                                          Static PE Info

                                          General

                                          Entrypoint:0x4750f2
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                          Time Stamp:0x61E03534 [Thu Jan 13 14:20:36 2022 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:v4.0.30319
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                          Entrypoint Preview

                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al

                                          Data Directories

                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x750980x57.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x760000x27fc8.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x9e0000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                          Sections

                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000x730f80x73200False0.891795602606data7.78329348907IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                          .rsrc0x760000x27fc80x28000False0.0971069335938data4.27505940425IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x9e0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                          Resources

                                          NameRVASizeTypeLanguageCountry
                                          RT_ICON0x762800x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                                          RT_ICON0x86aa80x94a8data
                                          RT_ICON0x8ff500x5488data
                                          RT_ICON0x953d80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295
                                          RT_ICON0x996000x25a8data
                                          RT_ICON0x9bba80x10a8data
                                          RT_ICON0x9cc500x988data
                                          RT_ICON0x9d5d80x468GLS_BINARY_LSB_FIRST
                                          RT_GROUP_ICON0x9da400x76data
                                          RT_VERSION0x9dab80x35cdata
                                          RT_MANIFEST0x9de140x1b4XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators

                                          Imports

                                          DLLImport
                                          mscoree.dll_CorExeMain

                                          Version Infos

                                          DescriptionData
                                          Translation0x0000 0x04b0
                                          LegalCopyrightCopyright 2015
                                          Assembly Version1.0.0.0
                                          InternalNameResourceExposureAttribu.exe
                                          FileVersion1.0.0.0
                                          CompanyName
                                          LegalTrademarks
                                          Comments
                                          ProductNameram machine
                                          ProductVersion1.0.0.0
                                          FileDescriptionram machine
                                          OriginalFilenameResourceExposureAttribu.exe

                                          Network Behavior

                                          Snort IDS Alerts

                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                          01/13/22-18:04:03.012940UDP254DNS SPOOF query response with TTL of 1 min. and no authority53603388.8.8.8192.168.2.7
                                          01/13/22-18:04:08.378279UDP254DNS SPOOF query response with TTL of 1 min. and no authority53597628.8.8.8192.168.2.7
                                          01/13/22-18:04:13.815191UDP254DNS SPOOF query response with TTL of 1 min. and no authority53543298.8.8.8192.168.2.7
                                          01/13/22-18:05:06.309288UDP254DNS SPOOF query response with TTL of 1 min. and no authority53609838.8.8.8192.168.2.7
                                          01/13/22-18:05:11.492794UDP254DNS SPOOF query response with TTL of 1 min. and no authority53492478.8.8.8192.168.2.7
                                          01/13/22-18:05:16.661585UDP254DNS SPOOF query response with TTL of 1 min. and no authority53522868.8.8.8192.168.2.7
                                          01/13/22-18:05:37.804947UDP254DNS SPOOF query response with TTL of 1 min. and no authority53637448.8.8.8192.168.2.7
                                          01/13/22-18:05:42.928983UDP254DNS SPOOF query response with TTL of 1 min. and no authority53614578.8.8.8192.168.2.7

                                          Network Port Distribution

                                          TCP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 13, 2022 18:04:03.023016930 CET4975555098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:03.048435926 CET5509849755185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:03.680321932 CET4975555098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:03.704442978 CET5509849755185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:04.226433039 CET4975555098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:04.250581026 CET5509849755185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:08.379875898 CET4975855098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:08.404119968 CET5509849758185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:08.977648020 CET4975855098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:09.001723051 CET5509849758185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:09.587078094 CET4975855098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:09.610728979 CET5509849758185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:13.890511036 CET4975955098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:13.914628983 CET5509849759185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:14.415612936 CET4975955098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:14.439579010 CET5509849759185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:14.946876049 CET4975955098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:14.976330996 CET5509849759185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:18.980063915 CET4976055098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:19.003940105 CET5509849760185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:19.509835005 CET4976055098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:19.533442020 CET5509849760185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:20.041053057 CET4976055098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:20.064686060 CET5509849760185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:24.074326038 CET4976355098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:24.098784924 CET5509849763185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:24.603946924 CET4976355098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:24.627934933 CET5509849763185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:25.135243893 CET4976355098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:25.158833981 CET5509849763185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:29.168348074 CET4976755098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:29.192517042 CET5509849767185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:29.760720015 CET4976755098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:29.787620068 CET5509849767185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:30.463849068 CET4976755098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:30.488112926 CET5509849767185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:34.718271971 CET4977155098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:34.742208004 CET5509849771185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:35.386429071 CET4977155098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:35.410619020 CET5509849771185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:35.995567083 CET4977155098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:36.019526958 CET5509849771185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:40.116799116 CET4977855098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:40.140837908 CET5509849778185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:40.652154922 CET4977855098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:40.676302910 CET5509849778185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:41.183506966 CET4977855098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:41.207660913 CET5509849778185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:45.292887926 CET4978555098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:45.316867113 CET5509849785185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:45.825052023 CET4978555098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:45.849160910 CET5509849785185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:46.355882883 CET4978555098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:46.380105972 CET5509849785185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:50.538305044 CET4978655098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:50.562010050 CET5509849786185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:51.121808052 CET4978655098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:51.145586014 CET5509849786185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:51.824984074 CET4978655098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:51.848680973 CET5509849786185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:55.873840094 CET4979355098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:55.897454977 CET5509849793185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:56.513299942 CET4979355098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:56.538996935 CET5509849793185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:04:57.122313976 CET4979355098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:04:57.145919085 CET5509849793185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:01.155509949 CET4981455098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:01.181788921 CET5509849814185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:01.685175896 CET4981455098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:01.710355997 CET5509849814185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:02.216474056 CET4981455098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:02.240359068 CET5509849814185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:06.311001062 CET4982255098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:06.335269928 CET5509849822185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:06.841893911 CET4982255098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:06.866044044 CET5509849822185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:07.375725031 CET4982255098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:07.399826050 CET5509849822185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:11.496551037 CET4982355098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:11.520653009 CET5509849823185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:12.029874086 CET4982355098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:12.053770065 CET5509849823185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:12.561147928 CET4982355098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:12.585370064 CET5509849823185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:16.663760900 CET4982555098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:16.687494993 CET5509849825185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:17.202119112 CET4982555098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:17.225759983 CET5509849825185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:17.733401060 CET4982555098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:17.757031918 CET5509849825185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:21.766586065 CET4982755098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:21.790473938 CET5509849827185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:22.296396971 CET4982755098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:22.320244074 CET5509849827185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:22.827615976 CET4982755098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:22.851484060 CET5509849827185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:26.863689899 CET4982855098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:26.888108015 CET5509849828185.140.53.130192.168.2.7
                                          Jan 13, 2022 18:05:27.406096935 CET4982855098192.168.2.7185.140.53.130
                                          Jan 13, 2022 18:05:27.429822922 CET5509849828185.140.53.130192.168.2.7

                                          UDP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 13, 2022 18:04:02.991837025 CET6033853192.168.2.78.8.8.8
                                          Jan 13, 2022 18:04:03.012939930 CET53603388.8.8.8192.168.2.7
                                          Jan 13, 2022 18:04:08.357667923 CET5976253192.168.2.78.8.8.8
                                          Jan 13, 2022 18:04:08.378278971 CET53597628.8.8.8192.168.2.7
                                          Jan 13, 2022 18:04:13.791904926 CET5432953192.168.2.78.8.8.8
                                          Jan 13, 2022 18:04:13.815191031 CET53543298.8.8.8192.168.2.7
                                          Jan 13, 2022 18:04:34.693816900 CET5281653192.168.2.78.8.8.8
                                          Jan 13, 2022 18:04:34.714128971 CET53528168.8.8.8192.168.2.7
                                          Jan 13, 2022 18:04:40.096425056 CET5078153192.168.2.78.8.8.8
                                          Jan 13, 2022 18:04:40.115456104 CET53507818.8.8.8192.168.2.7
                                          Jan 13, 2022 18:04:45.271754980 CET5491153192.168.2.78.8.8.8
                                          Jan 13, 2022 18:04:45.291075945 CET53549118.8.8.8192.168.2.7
                                          Jan 13, 2022 18:05:06.290409088 CET6098353192.168.2.78.8.8.8
                                          Jan 13, 2022 18:05:06.309288025 CET53609838.8.8.8192.168.2.7
                                          Jan 13, 2022 18:05:11.471663952 CET4924753192.168.2.78.8.8.8
                                          Jan 13, 2022 18:05:11.492794037 CET53492478.8.8.8192.168.2.7
                                          Jan 13, 2022 18:05:16.642559052 CET5228653192.168.2.78.8.8.8
                                          Jan 13, 2022 18:05:16.661585093 CET53522868.8.8.8192.168.2.7
                                          Jan 13, 2022 18:05:37.786194086 CET6374453192.168.2.78.8.8.8
                                          Jan 13, 2022 18:05:37.804946899 CET53637448.8.8.8192.168.2.7
                                          Jan 13, 2022 18:05:42.908484936 CET6145753192.168.2.78.8.8.8
                                          Jan 13, 2022 18:05:42.928982973 CET53614578.8.8.8192.168.2.7
                                          Jan 13, 2022 18:05:48.033751011 CET6059953192.168.2.78.8.8.8
                                          Jan 13, 2022 18:05:48.053014040 CET53605998.8.8.8192.168.2.7

                                          DNS Queries

                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                          Jan 13, 2022 18:04:02.991837025 CET192.168.2.78.8.8.80xb5dfStandard query (0)55098hustlenow.hopto.orgA (IP address)IN (0x0001)
                                          Jan 13, 2022 18:04:08.357667923 CET192.168.2.78.8.8.80x4563Standard query (0)55098hustlenow.hopto.orgA (IP address)IN (0x0001)
                                          Jan 13, 2022 18:04:13.791904926 CET192.168.2.78.8.8.80x8a19Standard query (0)55098hustlenow.hopto.orgA (IP address)IN (0x0001)
                                          Jan 13, 2022 18:04:34.693816900 CET192.168.2.78.8.8.80x81c6Standard query (0)55098hustlenow.hopto.orgA (IP address)IN (0x0001)
                                          Jan 13, 2022 18:04:40.096425056 CET192.168.2.78.8.8.80x3395Standard query (0)55098hustlenow.hopto.orgA (IP address)IN (0x0001)
                                          Jan 13, 2022 18:04:45.271754980 CET192.168.2.78.8.8.80x925eStandard query (0)55098hustlenow.hopto.orgA (IP address)IN (0x0001)
                                          Jan 13, 2022 18:05:06.290409088 CET192.168.2.78.8.8.80x87abStandard query (0)55098hustlenow.hopto.orgA (IP address)IN (0x0001)
                                          Jan 13, 2022 18:05:11.471663952 CET192.168.2.78.8.8.80xea24Standard query (0)55098hustlenow.hopto.orgA (IP address)IN (0x0001)
                                          Jan 13, 2022 18:05:16.642559052 CET192.168.2.78.8.8.80x90a2Standard query (0)55098hustlenow.hopto.orgA (IP address)IN (0x0001)
                                          Jan 13, 2022 18:05:37.786194086 CET192.168.2.78.8.8.80xb6beStandard query (0)55098hustlenow.hopto.orgA (IP address)IN (0x0001)
                                          Jan 13, 2022 18:05:42.908484936 CET192.168.2.78.8.8.80xbb12Standard query (0)55098hustlenow.hopto.orgA (IP address)IN (0x0001)
                                          Jan 13, 2022 18:05:48.033751011 CET192.168.2.78.8.8.80xb2f8Standard query (0)55098hustlenow.hopto.orgA (IP address)IN (0x0001)

                                          DNS Answers

                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                          Jan 13, 2022 18:04:03.012939930 CET8.8.8.8192.168.2.70xb5dfNo error (0)55098hustlenow.hopto.org185.140.53.130A (IP address)IN (0x0001)
                                          Jan 13, 2022 18:04:08.378278971 CET8.8.8.8192.168.2.70x4563No error (0)55098hustlenow.hopto.org185.140.53.130A (IP address)IN (0x0001)
                                          Jan 13, 2022 18:04:13.815191031 CET8.8.8.8192.168.2.70x8a19No error (0)55098hustlenow.hopto.org185.140.53.130A (IP address)IN (0x0001)
                                          Jan 13, 2022 18:04:34.714128971 CET8.8.8.8192.168.2.70x81c6No error (0)55098hustlenow.hopto.org185.140.53.130A (IP address)IN (0x0001)
                                          Jan 13, 2022 18:04:40.115456104 CET8.8.8.8192.168.2.70x3395No error (0)55098hustlenow.hopto.org185.140.53.130A (IP address)IN (0x0001)
                                          Jan 13, 2022 18:04:45.291075945 CET8.8.8.8192.168.2.70x925eNo error (0)55098hustlenow.hopto.org185.140.53.130A (IP address)IN (0x0001)
                                          Jan 13, 2022 18:05:06.309288025 CET8.8.8.8192.168.2.70x87abNo error (0)55098hustlenow.hopto.org185.140.53.130A (IP address)IN (0x0001)
                                          Jan 13, 2022 18:05:11.492794037 CET8.8.8.8192.168.2.70xea24No error (0)55098hustlenow.hopto.org185.140.53.130A (IP address)IN (0x0001)
                                          Jan 13, 2022 18:05:16.661585093 CET8.8.8.8192.168.2.70x90a2No error (0)55098hustlenow.hopto.org185.140.53.130A (IP address)IN (0x0001)
                                          Jan 13, 2022 18:05:37.804946899 CET8.8.8.8192.168.2.70xb6beNo error (0)55098hustlenow.hopto.org185.140.53.130A (IP address)IN (0x0001)
                                          Jan 13, 2022 18:05:42.928982973 CET8.8.8.8192.168.2.70xbb12No error (0)55098hustlenow.hopto.org185.140.53.130A (IP address)IN (0x0001)
                                          Jan 13, 2022 18:05:48.053014040 CET8.8.8.8192.168.2.70xb2f8No error (0)55098hustlenow.hopto.org185.140.53.130A (IP address)IN (0x0001)

                                          Code Manipulations

                                          Statistics

                                          Behavior

                                          Click to jump to process

                                          System Behavior

                                          General

                                          Start time:18:03:34
                                          Start date:13/01/2022
                                          Path:C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\TT#U007e)9383763563783039847949N.cmd.exe"
                                          Imagebase:0x640000
                                          File size:636416 bytes
                                          MD5 hash:398E8790480F654B4D677847BA454560
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.290665928.0000000002B05000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.290448066.0000000002A11000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.291731877.0000000003A19000.00000004.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.291731877.0000000003A19000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.291731877.0000000003A19000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          Reputation:low

                                          General

                                          Start time:18:03:46
                                          Start date:13/01/2022
                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wUDpvSE.exe
                                          Imagebase:0x1110000
                                          File size:430592 bytes
                                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Reputation:high

                                          General

                                          Start time:18:03:46
                                          Start date:13/01/2022
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff774ee0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:18:03:47
                                          Start date:13/01/2022
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wUDpvSE" /XML "C:\Users\user\AppData\Local\Temp\tmp1EE6.tmp
                                          Imagebase:0x810000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:18:03:48
                                          Start date:13/01/2022
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff774ee0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:18:03:50
                                          Start date:13/01/2022
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Imagebase:0xc90000
                                          File size:45152 bytes
                                          MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.517211527.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.517211527.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.517211527.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.523432863.00000000059D0000.00000004.00020000.sdmp, Author: Florian Roth
                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.523432863.00000000059D0000.00000004.00020000.sdmp, Author: Florian Roth
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.524096119.0000000005A70000.00000004.00020000.sdmp, Author: Florian Roth
                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.524096119.0000000005A70000.00000004.00020000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.524096119.0000000005A70000.00000004.00020000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.522152896.00000000041A9000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.522152896.00000000041A9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.285492337.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.285492337.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.285492337.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.287299484.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.287299484.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.287299484.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.286086026.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.286086026.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.286086026.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.286443560.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.286443560.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.286443560.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          Reputation:high

                                          General

                                          Start time:18:03:57
                                          Start date:13/01/2022
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp3840.tmp
                                          Imagebase:0x810000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:18:03:58
                                          Start date:13/01/2022
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff774ee0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:18:04:00
                                          Start date:13/01/2022
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp42FF.tmp
                                          Imagebase:0x810000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:18:04:00
                                          Start date:13/01/2022
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe 0
                                          Imagebase:0x570000
                                          File size:45152 bytes
                                          MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Reputation:high

                                          General

                                          Start time:18:04:00
                                          Start date:13/01/2022
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff774ee0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language

                                          General

                                          Start time:18:04:00
                                          Start date:13/01/2022
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff774ee0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language

                                          General

                                          Start time:18:04:02
                                          Start date:13/01/2022
                                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                          Imagebase:0x660000
                                          File size:45152 bytes
                                          MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Antivirus matches:
                                          • Detection: 0%, Metadefender, Browse
                                          • Detection: 0%, ReversingLabs

                                          General

                                          Start time:18:04:03
                                          Start date:13/01/2022
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff774ee0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language

                                          General

                                          Start time:18:04:05
                                          Start date:13/01/2022
                                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                          Imagebase:0xb10000
                                          File size:45152 bytes
                                          MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET

                                          General

                                          Start time:18:04:06
                                          Start date:13/01/2022
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff774ee0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language

                                          Disassembly

                                          Code Analysis

                                          Reset < >