Loading ...

Play interactive tourEdit tour

Windows Analysis Report PO#0065026.doc.exe

Overview

General Information

Sample Name:PO#0065026.doc.exe
Analysis ID:553030
MD5:233064525984666fe973125f4e60c903
SHA1:91bec44a6ff58c22cc58122b2daab04fd54dcf8e
SHA256:30e1ba61a63a27b668eee09f960a83d944e878c33b46f85ea86bacdf1427f4dd
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: Suspicious Double Extension
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sigma detected: Suspicius Add Task From User AppData Temp
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • PO#0065026.doc.exe (PID: 7096 cmdline: "C:\Users\user\Desktop\PO#0065026.doc.exe" MD5: 233064525984666FE973125F4E60C903)
    • PO#0065026.doc.exe (PID: 5348 cmdline: C:\Users\user\Desktop\PO#0065026.doc.exe MD5: 233064525984666FE973125F4E60C903)
      • schtasks.exe (PID: 6524 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp71C5.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6724 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp7E78.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • PO#0065026.doc.exe (PID: 6712 cmdline: C:\Users\user\Desktop\PO#0065026.doc.exe 0 MD5: 233064525984666FE973125F4E60C903)
    • PO#0065026.doc.exe (PID: 7160 cmdline: C:\Users\user\Desktop\PO#0065026.doc.exe MD5: 233064525984666FE973125F4E60C903)
  • dhcpmon.exe (PID: 7112 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: 233064525984666FE973125F4E60C903)
  • dhcpmon.exe (PID: 1312 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 233064525984666FE973125F4E60C903)
    • dhcpmon.exe (PID: 6616 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 233064525984666FE973125F4E60C903)
    • dhcpmon.exe (PID: 6592 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 233064525984666FE973125F4E60C903)
    • BackgroundTransferHost.exe (PID: 6616 cmdline: "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1 MD5: 02BA81746B929ECC9DB6665589B68335)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "1122355e-5fe3-470d-a458-8c4cf035", "Group": "Default", "Domain1": "185.140.53.132", "Domain2": "127.0.0.1", "Port": 1604, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000016.00000000.366825626.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000016.00000000.366825626.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000016.00000000.366825626.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000013.00000000.333627100.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000013.00000000.333627100.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 80 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      1.2.PO#0065026.doc.exe.5131b38.5.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe38d:$x1: NanoCore.ClientPluginHost
      • 0xe3ca:$x2: IClientNetworkHost
      • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      1.2.PO#0065026.doc.exe.5131b38.5.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe105:$x1: NanoCore Client.exe
      • 0xe38d:$x2: NanoCore.ClientPluginHost
      • 0xf9c6:$s1: PluginCommand
      • 0xf9ba:$s2: FileCommand
      • 0x1086b:$s3: PipeExists
      • 0x16622:$s4: PipeCreated
      • 0xe3b7:$s5: IClientLoggingHost
      1.2.PO#0065026.doc.exe.5131b38.5.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        1.2.PO#0065026.doc.exe.5131b38.5.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xe0f5:$a: NanoCore
        • 0xe105:$a: NanoCore
        • 0xe339:$a: NanoCore
        • 0xe34d:$a: NanoCore
        • 0xe38d:$a: NanoCore
        • 0xe154:$b: ClientPlugin
        • 0xe356:$b: ClientPlugin
        • 0xe396:$b: ClientPlugin
        • 0xe27b:$c: ProjectData
        • 0xec82:$d: DESCrypto
        • 0x1664e:$e: KeepAlive
        • 0x1463c:$g: LogClientMessage
        • 0x10837:$i: get_Connected
        • 0xefb8:$j: #=q
        • 0xefe8:$j: #=q
        • 0xf004:$j: #=q
        • 0xf034:$j: #=q
        • 0xf050:$j: #=q
        • 0xf06c:$j: #=q
        • 0xf09c:$j: #=q
        • 0xf0b8:$j: #=q
        19.0.PO#0065026.doc.exe.400000.8.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0x1018d:$x1: NanoCore.ClientPluginHost
        • 0x101ca:$x2: IClientNetworkHost
        • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        Click to see the 142 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\PO#0065026.doc.exe, ProcessId: 5348, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\PO#0065026.doc.exe, ProcessId: 5348, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        System Summary:

        barindex
        Sigma detected: Suspicious Double ExtensionShow sources
        Source: Process startedAuthor: Florian Roth (rule), @blu3_team (idea): Data: Command: C:\Users\user\Desktop\PO#0065026.doc.exe, CommandLine: C:\Users\user\Desktop\PO#0065026.doc.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\PO#0065026.doc.exe, NewProcessName: C:\Users\user\Desktop\PO#0065026.doc.exe, OriginalFileName: C:\Users\user\Desktop\PO#0065026.doc.exe, ParentCommandLine: "C:\Users\user\Desktop\PO#0065026.doc.exe" , ParentImage: C:\Users\user\Desktop\PO#0065026.doc.exe, ParentProcessId: 7096, ProcessCommandLine: C:\Users\user\Desktop\PO#0065026.doc.exe, ProcessId: 5348
        Sigma detected: Suspicius Add Task From User AppData TempShow sources
        Source: Process startedAuthor: frack113: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp71C5.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp71C5.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\PO#0065026.doc.exe, ParentImage: C:\Users\user\Desktop\PO#0065026.doc.exe, ParentProcessId: 5348, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp71C5.tmp, ProcessId: 6524

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\PO#0065026.doc.exe, ProcessId: 5348, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\PO#0065026.doc.exe, ProcessId: 5348, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000016.00000002.391042000.0000000002B51000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "1122355e-5fe3-470d-a458-8c4cf035", "Group": "Default", "Domain1": "185.140.53.132", "Domain2": "127.0.0.1", "Port": 1604, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Multi AV Scanner detection for submitted fileShow sources
        Source: PO#0065026.doc.exeReversingLabs: Detection: 23%
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 23%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.5131b38.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4fd2388.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4cd1e50.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4cd1e50.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4f9f768.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.50fef18.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3b9b7be.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.5131b38.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c905f4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4c9f230.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4fd2388.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3ba05f4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c905f4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c8b7be.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.50fef18.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c94c1d.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3ba4c1d.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4c9f230.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3ba05f4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4f9f768.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000016.00000000.366825626.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.333627100.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.391042000.0000000002B51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.337826803.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.335589407.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.300740890.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.389921703.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000000.367777233.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.302917559.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.352052455.0000000004E90000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000000.369712840.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.366690953.0000000002C41000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.300022383.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.312409953.0000000004FF0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000000.365733325.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.336831952.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.301457212.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.363668804.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.375404860.0000000004B90000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.366795171.0000000003C49000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.391135988.0000000003B59000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 7096, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 5348, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 6712, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 7160, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1312, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6592, type: MEMORYSTR
        Machine Learning detection for sampleShow sources
        Source: PO#0065026.doc.exeJoe Sandbox ML: detected
        Machine Learning detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Source: 19.0.PO#0065026.doc.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 22.0.dhcpmon.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 19.0.PO#0065026.doc.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 10.0.PO#0065026.doc.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 19.0.PO#0065026.doc.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 10.0.PO#0065026.doc.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 19.0.PO#0065026.doc.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 19.0.PO#0065026.doc.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 10.0.PO#0065026.doc.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 22.0.dhcpmon.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 10.0.PO#0065026.doc.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 22.0.dhcpmon.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 22.0.dhcpmon.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 10.0.PO#0065026.doc.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 22.0.dhcpmon.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 22.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 19.2.PO#0065026.doc.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7

        Compliance:

        barindex
        Detected unpacking (overwrites its own PE header)Show sources
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeUnpacked PE file: 1.2.PO#0065026.doc.exe.ee0000.0.unpack
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeUnpacked PE file: 13.2.PO#0065026.doc.exe.f10000.0.unpack
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeUnpacked PE file: 17.2.dhcpmon.exe.d0000.0.unpack
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeUnpacked PE file: 20.2.dhcpmon.exe.ba0000.0.unpack
        Source: PO#0065026.doc.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: PO#0065026.doc.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49744 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49747 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49748 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49749 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49750 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49752 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49769 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49788 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49794 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49796 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49811 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49820 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49822 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49823 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49824 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49825 -> 185.140.53.132:1604
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49826 -> 185.140.53.132:1604
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: 185.140.53.132
        Source: Malware configuration extractorURLs: 127.0.0.1
        Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
        Source: Joe Sandbox ViewIP Address: 185.140.53.132 185.140.53.132
        Source: global trafficTCP traffic: 192.168.2.3:49744 -> 185.140.53.132:1604
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.132
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281908317.0000000008A92000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: PO#0065026.doc.exe, 00000001.00000003.282759013.0000000008A6F000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: PO#0065026.doc.exe, 00000001.00000003.281954598.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281931325.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281983436.0000000008A92000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comaU
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: PO#0065026.doc.exe, 00000001.00000003.282759013.0000000008A6F000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comn-u
        Source: PO#0065026.doc.exe, 00000001.00000003.282759013.0000000008A6F000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.compef6K
        Source: PO#0065026.doc.exe, 00000001.00000003.282759013.0000000008A6F000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comuesDK
        Source: PO#0065026.doc.exe, 00000001.00000003.286220065.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286794704.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286168834.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286696568.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286025037.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286077095.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286757609.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285994377.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286497925.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285955232.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286144506.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286054615.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285719117.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286193130.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286111728.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286341063.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286591042.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286369233.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286312331.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286286284.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286398367.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286435701.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286622956.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286467614.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: PO#0065026.doc.exe, 00000001.00000003.292204726.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: PO#0065026.doc.exe, 00000001.00000003.285719117.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: PO#0065026.doc.exe, 00000001.00000003.286497925.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286341063.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286591042.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286369233.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286312331.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286286284.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286398367.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286435701.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286622956.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286467614.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmlL
        Source: PO#0065026.doc.exe, 00000001.00000003.285719117.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/i-f1
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: PO#0065026.doc.exe, 00000001.00000003.287349533.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287421417.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287302845.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersU
        Source: PO#0065026.doc.exe, 00000001.00000003.286901024.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designerslR
        Source: PO#0065026.doc.exe, 00000001.00000003.285859144.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285794499.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285814497.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersp
        Source: PO#0065026.doc.exe, 00000001.00000003.287302845.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287057215.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF
        Source: PO#0065026.doc.exe, 00000001.00000003.286220065.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286168834.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286025037.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286077095.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285994377.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286144506.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286054615.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286193130.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286111728.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comFc
        Source: PO#0065026.doc.exe, 00000001.00000003.285719117.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comTTF
        Source: PO#0065026.doc.exe, 00000001.00000002.313547078.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292251947.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292352678.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292227161.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292325246.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.304155607.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comY
        Source: PO#0065026.doc.exe, 00000001.00000003.292251947.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292352678.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292227161.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292325246.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292204726.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
        Source: PO#0065026.doc.exe, 00000001.00000003.286220065.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286168834.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286696568.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286025037.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286077095.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286497925.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286144506.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286054615.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286193130.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286111728.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286341063.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286591042.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286369233.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286312331.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286286284.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286398367.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286435701.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286622956.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286467614.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comaO
        Source: PO#0065026.doc.exe, 00000001.00000003.286794704.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287349533.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287917248.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287421417.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287520519.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287016720.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287558454.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287600866.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287120035.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286941238.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287483541.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287248860.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287840611.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287181413.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287642342.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287684632.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287768748.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287302845.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287057215.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comaV
        Source: PO#0065026.doc.exe, 00000001.00000003.287016720.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287120035.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286941238.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287248860.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287181413.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287057215.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalsF
        Source: PO#0065026.doc.exe, 00000001.00000003.287349533.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287917248.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287421417.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287520519.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287558454.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287600866.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287483541.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287840611.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287642342.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287684632.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287768748.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287302845.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalsd
        Source: PO#0065026.doc.exe, 00000001.00000003.286794704.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287349533.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286829225.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287917248.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287421417.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287520519.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286901024.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287016720.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287558454.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287600866.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287120035.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286941238.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287483541.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286863067.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287248860.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287840611.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287181413.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287642342.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287684632.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287768748.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287302845.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287057215.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comcom
        Source: PO#0065026.doc.exe, 00000001.00000003.286497925.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286341063.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286369233.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286312331.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286286284.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286398367.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286435701.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286467614.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comcomFc
        Source: PO#0065026.doc.exe, 00000001.00000003.285994377.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285955232.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comda
        Source: PO#0065026.doc.exe, 00000001.00000003.286220065.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286168834.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286025037.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286077095.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285994377.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286144506.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286054615.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286193130.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286111728.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdc
        Source: PO#0065026.doc.exe, 00000001.00000003.286220065.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286168834.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286696568.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286025037.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286077095.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286497925.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286144506.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286054615.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286193130.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286111728.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286341063.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286591042.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286369233.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286312331.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286286284.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286398367.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286435701.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286622956.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286467614.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.come.com
        Source: PO#0065026.doc.exe, 00000001.00000003.287917248.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287421417.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287520519.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287558454.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287600866.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287483541.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287840611.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.288037067.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287642342.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287684632.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287979043.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287768748.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comionaY
        Source: PO#0065026.doc.exe, 00000001.00000003.286497925.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286341063.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286591042.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286369233.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286312331.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286286284.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286398367.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286435701.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286622956.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286467614.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comitu/D
        Source: PO#0065026.doc.exe, 00000001.00000002.313547078.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292251947.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292352678.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292227161.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292325246.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.304155607.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292204726.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.commcom
        Source: PO#0065026.doc.exe, 00000001.00000003.285794499.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285814497.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.como
        Source: PO#0065026.doc.exe, 00000001.00000003.285743125.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285794499.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285814497.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.compe
        Source: PO#0065026.doc.exe, 00000001.00000003.286901024.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287016720.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287120035.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286941238.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287248860.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287181413.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287057215.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comttod
        Source: PO#0065026.doc.exe, 00000001.00000002.313547078.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292251947.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292352678.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292227161.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292325246.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.304155607.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comue
        Source: PO#0065026.doc.exe, 00000001.00000003.286220065.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286168834.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286696568.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286025037.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286077095.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285994377.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286497925.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285955232.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286144506.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285877220.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286054615.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285859144.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286193130.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286111728.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286341063.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285794499.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286591042.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286369233.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286312331.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286286284.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286398367.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285894427.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286435701.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286622956.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285814497.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286467614.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285912034.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comzana
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281550617.0000000008A70000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281544705.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281564553.0000000008A93000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281675789.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281722139.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281496893.0000000008A70000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: PO#0065026.doc.exe, 00000001.00000003.281675789.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281341568.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281722139.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281766532.0000000008A76000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: PO#0065026.doc.exe, 00000001.00000003.281456683.0000000008A94000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281463758.0000000008A94000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnt
        Source: PO#0065026.doc.exe, 00000001.00000003.289451558.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.289584198.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.289708771.0000000008A76000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.289557495.0000000008A76000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
        Source: PO#0065026.doc.exe, 00000001.00000003.289557495.0000000008A76000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/CD
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: PO#0065026.doc.exe, 00000001.00000003.289747236.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.289451558.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.289584198.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/V
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283325550.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284860652.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: PO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/-hu
        Source: PO#0065026.doc.exe, 00000001.00000003.285170517.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284952891.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284921330.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284769961.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284991694.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285068399.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285040871.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285017058.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284892458.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285102887.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285137258.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284821861.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284860652.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/D
        Source: PO#0065026.doc.exe, 00000001.00000003.283755949.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/O
        Source: PO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/V
        Source: PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283967988.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283755949.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y
        Source: PO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0-f
        Source: PO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284769961.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284892458.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284821861.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284860652.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/O
        Source: PO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283967988.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283755949.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/c
        Source: PO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283967988.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/hi
        Source: PO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ite
        Source: PO#0065026.doc.exe, 00000001.00000003.284952891.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284921330.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284769961.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284991694.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285068399.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285040871.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285017058.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283967988.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283755949.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284892458.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284821861.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284860652.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: PO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/c
        Source: PO#0065026.doc.exe, 00000001.00000003.285170517.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284952891.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284921330.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284769961.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284991694.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285068399.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285040871.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285017058.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284892458.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285102887.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285137258.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284821861.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284860652.0000000008A91000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/uro
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: PO#0065026.doc.exe, 00000001.00000003.281908317.0000000008A92000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnaU
        Source: PO#0065026.doc.exe, 00000013.00000002.366690953.0000000002C41000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.5131b38.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4fd2388.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4cd1e50.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4cd1e50.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4f9f768.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.50fef18.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3b9b7be.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.5131b38.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c905f4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4c9f230.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4fd2388.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3ba05f4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c905f4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c8b7be.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.50fef18.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c94c1d.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3ba4c1d.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4c9f230.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3ba05f4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4f9f768.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000016.00000000.366825626.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.333627100.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.391042000.0000000002B51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.337826803.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.335589407.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.300740890.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.389921703.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000000.367777233.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.302917559.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.352052455.0000000004E90000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000000.369712840.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.366690953.0000000002C41000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.300022383.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.312409953.0000000004FF0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000000.365733325.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.336831952.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.301457212.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.363668804.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.375404860.0000000004B90000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.366795171.0000000003C49000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.391135988.0000000003B59000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 7096, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 5348, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 6712, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 7160, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1312, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6592, type: MEMORYSTR

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 1.2.PO#0065026.doc.exe.5131b38.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.PO#0065026.doc.exe.5131b38.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 10.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.PO#0065026.doc.exe.4fd2388.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.PO#0065026.doc.exe.4fd2388.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 20.2.dhcpmon.exe.4cd1e50.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 20.2.dhcpmon.exe.4cd1e50.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 20.2.dhcpmon.exe.4cd1e50.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 20.2.dhcpmon.exe.4cd1e50.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.PO#0065026.doc.exe.4f9f768.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.PO#0065026.doc.exe.4f9f768.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 10.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.PO#0065026.doc.exe.50fef18.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.PO#0065026.doc.exe.50fef18.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.2.dhcpmon.exe.3b9b7be.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.dhcpmon.exe.3b9b7be.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 10.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.PO#0065026.doc.exe.5131b38.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.PO#0065026.doc.exe.5131b38.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.PO#0065026.doc.exe.3c905f4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 20.2.dhcpmon.exe.4c9f230.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 20.2.dhcpmon.exe.4c9f230.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.2.dhcpmon.exe.2bb9658.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.PO#0065026.doc.exe.4fd2388.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.PO#0065026.doc.exe.4fd2388.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.2.dhcpmon.exe.3ba05f4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.PO#0065026.doc.exe.2ca9588.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.PO#0065026.doc.exe.3c905f4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.PO#0065026.doc.exe.3c8b7be.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.PO#0065026.doc.exe.3c8b7be.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.PO#0065026.doc.exe.50fef18.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.PO#0065026.doc.exe.50fef18.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.PO#0065026.doc.exe.3c94c1d.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 10.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.2.dhcpmon.exe.3ba4c1d.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 20.2.dhcpmon.exe.4c9f230.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 20.2.dhcpmon.exe.4c9f230.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.2.dhcpmon.exe.3ba05f4.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.PO#0065026.doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.PO#0065026.doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.PO#0065026.doc.exe.4f9f768.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.PO#0065026.doc.exe.4f9f768.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000000.366825626.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000016.00000000.366825626.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000000.333627100.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000013.00000000.333627100.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000002.391042000.0000000002B51000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000000.337826803.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000013.00000000.337826803.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000000.335589407.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000013.00000000.335589407.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000A.00000000.300740890.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000A.00000000.300740890.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000002.389921703.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000016.00000002.389921703.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000000.367777233.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000016.00000000.367777233.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000A.00000000.302917559.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000A.00000000.302917559.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000D.00000002.352052455.0000000004E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000D.00000002.352052455.0000000004E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000000.369712840.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000016.00000000.369712840.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.366690953.0000000002C41000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000A.00000000.300022383.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000A.00000000.300022383.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.312409953.0000000004FF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000002.312409953.0000000004FF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000000.365733325.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000016.00000000.365733325.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000000.336831952.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000013.00000000.336831952.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000A.00000000.301457212.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000A.00000000.301457212.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.363668804.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000013.00000002.363668804.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000014.00000002.375404860.0000000004B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000014.00000002.375404860.0000000004B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.366795171.0000000003C49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000002.391135988.0000000003B59000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: PO#0065026.doc.exe PID: 7096, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: PO#0065026.doc.exe PID: 7096, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: PO#0065026.doc.exe PID: 5348, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: PO#0065026.doc.exe PID: 5348, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: PO#0065026.doc.exe PID: 6712, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: PO#0065026.doc.exe PID: 6712, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: PO#0065026.doc.exe PID: 7160, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: PO#0065026.doc.exe PID: 7160, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 1312, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 1312, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 6592, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 6592, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: PO#0065026.doc.exe
        Source: PO#0065026.doc.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 1.2.PO#0065026.doc.exe.5131b38.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.PO#0065026.doc.exe.5131b38.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.PO#0065026.doc.exe.5131b38.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 22.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 10.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 10.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 10.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.PO#0065026.doc.exe.4fd2388.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.PO#0065026.doc.exe.4fd2388.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 13.2.PO#0065026.doc.exe.4fd2388.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 20.2.dhcpmon.exe.4cd1e50.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 20.2.dhcpmon.exe.4cd1e50.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 20.2.dhcpmon.exe.4cd1e50.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 20.2.dhcpmon.exe.4cd1e50.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 20.2.dhcpmon.exe.4cd1e50.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 20.2.dhcpmon.exe.4cd1e50.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.PO#0065026.doc.exe.4f9f768.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.PO#0065026.doc.exe.4f9f768.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 13.2.PO#0065026.doc.exe.4f9f768.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 10.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 10.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 10.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.PO#0065026.doc.exe.50fef18.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.PO#0065026.doc.exe.50fef18.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.PO#0065026.doc.exe.50fef18.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.2.dhcpmon.exe.3b9b7be.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.dhcpmon.exe.3b9b7be.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 22.2.dhcpmon.exe.3b9b7be.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 10.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 10.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 10.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.PO#0065026.doc.exe.5131b38.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.PO#0065026.doc.exe.5131b38.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.PO#0065026.doc.exe.5131b38.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.PO#0065026.doc.exe.3c905f4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.PO#0065026.doc.exe.3c905f4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 20.2.dhcpmon.exe.4c9f230.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 20.2.dhcpmon.exe.4c9f230.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.2.dhcpmon.exe.2bb9658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.dhcpmon.exe.2bb9658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 13.2.PO#0065026.doc.exe.4fd2388.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.PO#0065026.doc.exe.4fd2388.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 13.2.PO#0065026.doc.exe.4fd2388.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 22.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.2.dhcpmon.exe.3ba05f4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.dhcpmon.exe.3ba05f4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.2.PO#0065026.doc.exe.2ca9588.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.PO#0065026.doc.exe.2ca9588.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 10.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 10.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 10.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.PO#0065026.doc.exe.3c905f4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.PO#0065026.doc.exe.3c905f4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.2.PO#0065026.doc.exe.3c8b7be.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.PO#0065026.doc.exe.3c8b7be.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.2.PO#0065026.doc.exe.3c8b7be.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.PO#0065026.doc.exe.50fef18.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.PO#0065026.doc.exe.50fef18.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 22.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.PO#0065026.doc.exe.3c94c1d.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.PO#0065026.doc.exe.3c94c1d.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 22.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 22.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 10.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 10.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 10.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.2.dhcpmon.exe.3ba4c1d.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.dhcpmon.exe.3ba4c1d.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 20.2.dhcpmon.exe.4c9f230.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 20.2.dhcpmon.exe.4c9f230.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 20.2.dhcpmon.exe.4c9f230.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.2.dhcpmon.exe.3ba05f4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.dhcpmon.exe.3ba05f4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 22.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 22.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 22.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.PO#0065026.doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.PO#0065026.doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.2.PO#0065026.doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.PO#0065026.doc.exe.4f9f768.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.PO#0065026.doc.exe.4f9f768.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000000.366825626.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000016.00000000.366825626.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000000.333627100.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000013.00000000.333627100.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000002.391042000.0000000002B51000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000000.337826803.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000013.00000000.337826803.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000000.335589407.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000013.00000000.335589407.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000A.00000000.300740890.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000A.00000000.300740890.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000002.389921703.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000016.00000002.389921703.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000000.367777233.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000016.00000000.367777233.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000A.00000000.302917559.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000A.00000000.302917559.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000D.00000002.352052455.0000000004E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000D.00000002.352052455.0000000004E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000000.369712840.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000016.00000000.369712840.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.366690953.0000000002C41000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000A.00000000.300022383.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000A.00000000.300022383.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.312409953.0000000004FF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.312409953.0000000004FF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000000.365733325.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000016.00000000.365733325.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000000.336831952.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000013.00000000.336831952.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000A.00000000.301457212.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000A.00000000.301457212.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.363668804.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000013.00000002.363668804.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000014.00000002.375404860.0000000004B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000014.00000002.375404860.0000000004B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.366795171.0000000003C49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000002.391135988.0000000003B59000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: PO#0065026.doc.exe PID: 7096, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: PO#0065026.doc.exe PID: 7096, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: PO#0065026.doc.exe PID: 5348, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: PO#0065026.doc.exe PID: 5348, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: PO#0065026.doc.exe PID: 6712, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: PO#0065026.doc.exe PID: 6712, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: PO#0065026.doc.exe PID: 7160, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: PO#0065026.doc.exe PID: 7160, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 1312, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 1312, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 6592, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 6592, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_01900BA8
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_01901FC0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_019033C0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_01901310
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_01901300
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_019032C8
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_019017C5
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_019027E0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_0190170A
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_0190173F
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_019019A7
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_019028C0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_0190186E
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_01900B9A
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_01901D8C
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_01901C92
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_01901C4D
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_01902F98
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_01900FF0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_01901E76
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_0BA3D880
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_0BA30FE2
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_0BA30FF0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_0BA37EA1
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_0BA37EB0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_0BA37C38
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_0BA37C48
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_0BA35447
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_0BA35458
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_0BE20040
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_0BE20CF8
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_057F1FC0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_057F0BA8
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_057F0460
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_057F170A
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_057F33D0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_057F33C0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_057F28C0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_057F28B1
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_0A0B0040
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_0A0B0CF8
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_0B590FF0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_0B590FEA
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_0B597EB0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_0B597EA1
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_0B597C48
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_0B597C38
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_0B595458
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_0B595447
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_02410BA8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_02411FC0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_024133C0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_024133D0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_0241170A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_0241173F
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_024117C5
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_02410B82
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_0241186E
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_024128C0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_024128B1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_024119A7
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_02411E76
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_02411FB8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_02411C4D
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_02411C92
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_02411D8C
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_07A7C350
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_07A7EA88
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_07A7F1A0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 19_2_02C0E480
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 19_2_02C0E471
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 19_2_02C0BBD4
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_03030BA8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_03031FC0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_030332C8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_030307E7
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_030306BA
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_030306F1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_0303051D
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_03030578
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_030305AF
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_030304AC
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_03030B01
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_03030A57
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_03030A6A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_03030A99
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_03030904
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_03030970
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_0303084D
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_030328B1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_030328C0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_030308C5
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_03031F93
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_09D50040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_09D50CF8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_09D54FE0
        Source: PO#0065026.doc.exeBinary or memory string: OriginalFilename vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 00000001.00000002.304891399.0000000001010000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameDelegateEnt.exe0 vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 00000001.00000002.313958862.000000000BA00000.00000004.00020000.sdmpBinary or memory string: OriginalFilenamePeriodicity.dllL vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 00000001.00000002.306051032.0000000003510000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePeriodicity.dllL vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 00000001.00000002.314043118.000000000BC70000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 00000001.00000002.307445609.0000000004D08000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dllF vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 0000000A.00000000.297414840.0000000000A80000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameDelegateEnt.exe0 vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 0000000A.00000003.309845721.0000000001301000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDelegateEnt.exe0 vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 0000000A.00000003.326644045.000000000135F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exeBinary or memory string: OriginalFilename vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 0000000D.00000002.341793363.000000000178A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 0000000D.00000002.355322133.0000000009EF0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 0000000D.00000002.341133942.0000000001040000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameDelegateEnt.exe0 vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 0000000D.00000002.344764757.0000000004BA8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dllF vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 0000000D.00000002.342454786.00000000033B0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePeriodicity.dllL vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 00000013.00000000.334788096.00000000007F0000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameDelegateEnt.exe0 vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 00000013.00000002.366690953.0000000002C41000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 00000013.00000002.366690953.0000000002C41000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 00000013.00000002.366795171.0000000003C49000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 00000013.00000002.366795171.0000000003C49000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exe, 00000013.00000002.366795171.0000000003C49000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exeBinary or memory string: OriginalFilenameDelegateEnt.exe0 vs PO#0065026.doc.exe
        Source: PO#0065026.doc.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: dhcpmon.exe.10.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: PO#0065026.doc.exeReversingLabs: Detection: 23%
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeFile read: C:\Users\user\Desktop\PO#0065026.doc.exeJump to behavior
        Source: PO#0065026.doc.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\PO#0065026.doc.exe "C:\Users\user\Desktop\PO#0065026.doc.exe"
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess created: C:\Users\user\Desktop\PO#0065026.doc.exe C:\Users\user\Desktop\PO#0065026.doc.exe
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp71C5.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\PO#0065026.doc.exe C:\Users\user\Desktop\PO#0065026.doc.exe 0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp7E78.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess created: C:\Users\user\Desktop\PO#0065026.doc.exe C:\Users\user\Desktop\PO#0065026.doc.exe
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\BackgroundTransferHost.exe "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess created: C:\Users\user\Desktop\PO#0065026.doc.exe C:\Users\user\Desktop\PO#0065026.doc.exe
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp71C5.tmp
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp7E78.tmp
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess created: C:\Users\user\Desktop\PO#0065026.doc.exe C:\Users\user\Desktop\PO#0065026.doc.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO#0065026.doc.exe.logJump to behavior
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeFile created: C:\Users\user\AppData\Local\Temp\tmp71C5.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@19/11@0/1
        Source: PO#0065026.doc.exe, 00000001.00000002.306051032.0000000003510000.00000004.00000001.sdmp, PO#0065026.doc.exe, 0000000D.00000002.342454786.00000000033B0000.00000004.00000001.sdmp, dhcpmon.exe, 00000011.00000002.340545804.0000000002610000.00000004.00000001.sdmp, dhcpmon.exe, 00000014.00000002.373248632.00000000030B0000.00000004.00000001.sdmpBinary or memory string: SELECT @MAX = MAX([{0}])+1 FROM {1};5
        Source: PO#0065026.doc.exe, 00000001.00000002.306051032.0000000003510000.00000004.00000001.sdmp, PO#0065026.doc.exe, 0000000D.00000002.342454786.00000000033B0000.00000004.00000001.sdmp, dhcpmon.exe, 00000011.00000002.340545804.0000000002610000.00000004.00000001.sdmp, dhcpmon.exe, 00000014.00000002.373248632.00000000030B0000.00000004.00000001.sdmpBinary or memory string: SELECT IDENTITY_VAL_LOCAL() FROM SYSIBM.SYSDUMMY1;
        Source: 10.0.PO#0065026.doc.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 10.0.PO#0065026.doc.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 22.0.dhcpmon.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 22.0.dhcpmon.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 19.0.PO#0065026.doc.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 19.0.PO#0065026.doc.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 19.0.PO#0065026.doc.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 19.0.PO#0065026.doc.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 10.0.PO#0065026.doc.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 10.0.PO#0065026.doc.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 19.2.PO#0065026.doc.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 19.2.PO#0065026.doc.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 10.0.PO#0065026.doc.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 10.0.PO#0065026.doc.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 19.0.PO#0065026.doc.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 19.0.PO#0065026.doc.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 10.0.PO#0065026.doc.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 10.0.PO#0065026.doc.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 19.0.PO#0065026.doc.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 19.0.PO#0065026.doc.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 10.0.PO#0065026.doc.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 10.0.PO#0065026.doc.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 19.0.PO#0065026.doc.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 19.0.PO#0065026.doc.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6664:120:WilError_01
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{1122355e-5fe3-470d-a458-8c4cf0355482}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMutant created: \Sessions\1\BaseNamedObjects\rYslOPaYizoR
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6604:120:WilError_01
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: PO#0065026.doc.exe, 00000001.00000002.306051032.0000000003510000.00000004.00000001.sdmp, PO#0065026.doc.exe, 0000000D.00000002.342454786.00000000033B0000.00000004.00000001.sdmp, dhcpmon.exe, 00000011.00000002.340545804.0000000002610000.00000004.00000001.sdmp, dhcpmon.exe, 00000014.00000002.373248632.00000000030B0000.00000004.00000001.sdmpBinary or memory string: .csproj
        Source: PO#0065026.doc.exe, 00000001.00000002.306051032.0000000003510000.00000004.00000001.sdmp, PO#0065026.doc.exe, 0000000D.00000002.342454786.00000000033B0000.00000004.00000001.sdmp, dhcpmon.exe, 00000011.00000002.340545804.0000000002610000.00000004.00000001.sdmp, dhcpmon.exe, 00000014.00000002.373248632.00000000030B0000.00000004.00000001.sdmpBinary or memory string: .2010.csproj
        Source: 10.0.PO#0065026.doc.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 10.0.PO#0065026.doc.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 10.0.PO#0065026.doc.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 10.0.PO#0065026.doc.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 10.0.PO#0065026.doc.exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 10.0.PO#0065026.doc.exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 10.0.PO#0065026.doc.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 10.0.PO#0065026.doc.exe.400000.12.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 10.0.PO#0065026.doc.exe.400000.12.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: PO#0065026.doc.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: PO#0065026.doc.exeStatic file information: File size 1605632 > 1048576
        Source: PO#0065026.doc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: PO#0065026.doc.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x12ce00
        Source: PO#0065026.doc.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Data Obfuscation:

        barindex
        Detected unpacking (overwrites its own PE header)Show sources
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeUnpacked PE file: 1.2.PO#0065026.doc.exe.ee0000.0.unpack
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeUnpacked PE file: 13.2.PO#0065026.doc.exe.f10000.0.unpack
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeUnpacked PE file: 17.2.dhcpmon.exe.d0000.0.unpack
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeUnpacked PE file: 20.2.dhcpmon.exe.ba0000.0.unpack
        Detected unpacking (changes PE section rights)Show sources
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeUnpacked PE file: 1.2.PO#0065026.doc.exe.ee0000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeUnpacked PE file: 13.2.PO#0065026.doc.exe.f10000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeUnpacked PE file: 17.2.dhcpmon.exe.d0000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeUnpacked PE file: 20.2.dhcpmon.exe.ba0000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
        .NET source code contains potential unpackerShow sources
        Source: 10.0.PO#0065026.doc.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 10.0.PO#0065026.doc.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 10.0.PO#0065026.doc.exe.400000.10.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 10.0.PO#0065026.doc.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 10.0.PO#0065026.doc.exe.400000.12.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 10.0.PO#0065026.doc.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 10.0.PO#0065026.doc.exe.400000.6.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 10.0.PO#0065026.doc.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 10.0.PO#0065026.doc.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 10.0.PO#0065026.doc.exe.400000.8.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.0.PO#0065026.doc.exe.400000.10.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.0.PO#0065026.doc.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.0.PO#0065026.doc.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.0.PO#0065026.doc.exe.400000.12.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.0.PO#0065026.doc.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.0.PO#0065026.doc.exe.400000.8.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.0.PO#0065026.doc.exe.400000.6.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.0.PO#0065026.doc.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.0.PO#0065026.doc.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.0.PO#0065026.doc.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.2.PO#0065026.doc.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.2.PO#0065026.doc.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 22.0.dhcpmon.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 22.0.dhcpmon.exe.400000.10.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_00EE34D2 push esi; ret
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_00EE4A4C push ds; retf
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_00EE441D push ds; iretd
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_00EE51C2 push ds; iretd
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_00EE3370 push B75D66D8h; iretd
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 1_2_0BE2532F push FFFFFF8Bh; iretd
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_00F134D2 push esi; ret
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_00F14A4C push ds; retf
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_00F1441D push ds; iretd
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_00F151C2 push ds; iretd
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_00F13370 push B75D66D8h; iretd
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 13_2_0A0B533D push FFFFFF8Bh; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_000D441D push ds; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_000D4A4C push ds; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_000D34D2 push esi; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_000D3370 push B75D66D8h; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_000D51C2 push ds; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_07A75F38 push eax; mov dword ptr [esp], ecx
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_07A92166 push edi; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_07A90B96 push esi; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_07A98911 pushad ; iretd
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 19_2_006C4A4C push ds; retf
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 19_2_006C441D push ds; iretd
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 19_2_006C20C8 pushad ; iretd
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 19_2_006C34D2 push esi; ret
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 19_2_006C3370 push B75D66D8h; iretd
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 19_2_006C51C2 push ds; iretd
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeCode function: 19_2_006C2B83 push ebx; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_0021441D push ds; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_00214A4C push ds; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_002120C8 pushad ; iretd
        Source: initial sampleStatic PE information: section name: .text entropy: 7.06155313656
        Source: initial sampleStatic PE information: section name: .text entropy: 7.06155313656
        Source: 10.0.PO#0065026.doc.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 10.0.PO#0065026.doc.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 10.0.PO#0065026.doc.exe.400000.10.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 10.0.PO#0065026.doc.exe.400000.10.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 10.0.PO#0065026.doc.exe.400000.12.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 10.0.PO#0065026.doc.exe.400000.12.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 10.0.PO#0065026.doc.exe.400000.6.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 10.0.PO#0065026.doc.exe.400000.6.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 10.0.PO#0065026.doc.exe.400000.8.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 10.0.PO#0065026.doc.exe.400000.8.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 19.0.PO#0065026.doc.exe.400000.10.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 19.0.PO#0065026.doc.exe.400000.10.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 19.0.PO#0065026.doc.exe.400000.12.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 19.0.PO#0065026.doc.exe.400000.12.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 19.0.PO#0065026.doc.exe.400000.8.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 19.0.PO#0065026.doc.exe.400000.8.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 19.0.PO#0065026.doc.exe.400000.6.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 19.0.PO#0065026.doc.exe.400000.6.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 19.0.PO#0065026.doc.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 19.0.PO#0065026.doc.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 19.2.PO#0065026.doc.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 19.2.PO#0065026.doc.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 22.0.dhcpmon.exe.400000.10.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 22.0.dhcpmon.exe.400000.10.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp71C5.tmp

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeFile opened: C:\Users\user\Desktop\PO#0065026.doc.exe:Zone.Identifier read attributes | delete
        Uses an obfuscated file name to hide its real file extension (double extension)Show sources
        Source: Possible double extension: doc.exeStatic PE information: PO#0065026.doc.exe
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: 17.2.dhcpmon.exe.2689d4c.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3129d4c.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.3589c7c.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.3429c7c.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000014.00000002.373248632.00000000030B0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.340545804.0000000002610000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.306051032.0000000003510000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.342454786.00000000033B0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 7096, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 6712, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 7112, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1312, type: MEMORYSTR
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: PO#0065026.doc.exe, 00000001.00000002.306051032.0000000003510000.00000004.00000001.sdmp, PO#0065026.doc.exe, 0000000D.00000002.342454786.00000000033B0000.00000004.00000001.sdmp, dhcpmon.exe, 00000011.00000002.340545804.0000000002610000.00000004.00000001.sdmp, dhcpmon.exe, 00000014.00000002.373248632.00000000030B0000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: PO#0065026.doc.exe, 00000001.00000002.306051032.0000000003510000.00000004.00000001.sdmp, PO#0065026.doc.exe, 0000000D.00000002.342454786.00000000033B0000.00000004.00000001.sdmp, dhcpmon.exe, 00000011.00000002.340545804.0000000002610000.00000004.00000001.sdmp, dhcpmon.exe, 00000014.00000002.373248632.00000000030B0000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\PO#0065026.doc.exe TID: 7100Thread sleep time: -38998s >= -30000s
        Source: C:\Users\user\Desktop\PO#0065026.doc.exe TID: 7140Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\PO#0065026.doc.exe TID: 7016Thread sleep time: -13835058055282155s >= -30000s
        Source: C:\Users\user\Desktop\PO#0065026.doc.exe TID: 6708Thread sleep time: -35214s >= -30000s
        Source: C:\Users\user\Desktop\PO#0065026.doc.exe TID: 6652Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 7084Thread sleep time: -42467s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1068Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\PO#0065026.doc.exe TID: 1864Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1304Thread sleep time: -44497s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6208Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 7128Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWindow / User API: threadDelayed 4944
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWindow / User API: threadDelayed 4497
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWindow / User API: foregroundWindowGot 745
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWindow / User API: foregroundWindowGot 654
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeThread delayed: delay time: 38998
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeThread delayed: delay time: 35214
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 42467
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 44497
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: dhcpmon.exe, 00000014.00000002.373248632.00000000030B0000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
        Source: dhcpmon.exe, 00000014.00000002.373248632.00000000030B0000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 00000014.00000002.373248632.00000000030B0000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: dhcpmon.exe, 00000014.00000002.373248632.00000000030B0000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeMemory written: C:\Users\user\Desktop\PO#0065026.doc.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeMemory written: C:\Users\user\Desktop\PO#0065026.doc.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess created: C:\Users\user\Desktop\PO#0065026.doc.exe C:\Users\user\Desktop\PO#0065026.doc.exe
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp71C5.tmp
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp7E78.tmp
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeProcess created: C:\Users\user\Desktop\PO#0065026.doc.exe C:\Users\user\Desktop\PO#0065026.doc.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Users\user\Desktop\PO#0065026.doc.exe VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Users\user\Desktop\PO#0065026.doc.exe VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Users\user\Desktop\PO#0065026.doc.exe VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Users\user\Desktop\PO#0065026.doc.exe VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\PO#0065026.doc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.5131b38.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4fd2388.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4cd1e50.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4cd1e50.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4f9f768.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.50fef18.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3b9b7be.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.5131b38.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c905f4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4c9f230.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4fd2388.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3ba05f4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c905f4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c8b7be.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.50fef18.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c94c1d.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3ba4c1d.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4c9f230.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3ba05f4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4f9f768.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000016.00000000.366825626.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.333627100.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.391042000.0000000002B51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.337826803.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.335589407.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.300740890.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.389921703.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000000.367777233.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.302917559.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.352052455.0000000004E90000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000000.369712840.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.366690953.0000000002C41000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.300022383.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.312409953.0000000004FF0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000000.365733325.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.336831952.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.301457212.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.363668804.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.375404860.0000000004B90000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.366795171.0000000003C49000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.391135988.0000000003B59000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 7096, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 5348, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 6712, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 7160, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1312, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6592, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: PO#0065026.doc.exe, 00000001.00000002.312409953.0000000004FF0000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: PO#0065026.doc.exe, 0000000A.00000000.300740890.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: PO#0065026.doc.exe, 0000000A.00000003.326644045.000000000135F000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: PO#0065026.doc.exe, 0000000D.00000002.352052455.0000000004E90000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: PO#0065026.doc.exe, 00000013.00000000.333627100.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: PO#0065026.doc.exe, 00000013.00000002.366690953.0000000002C41000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: PO#0065026.doc.exe, 00000013.00000002.366690953.0000000002C41000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: PO#0065026.doc.exe, 00000013.00000002.366795171.0000000003C49000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: PO#0065026.doc.exe, 00000013.00000002.366795171.0000000003C49000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000014.00000002.375404860.0000000004B90000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000016.00000000.366825626.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000016.00000002.391042000.0000000002B51000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000016.00000002.391042000.0000000002B51000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000016.00000002.391135988.0000000003B59000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000016.00000002.391135988.0000000003B59000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.5131b38.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4fd2388.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4cd1e50.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4cd1e50.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4f9f768.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.0.PO#0065026.doc.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.50fef18.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3b9b7be.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.5131b38.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c905f4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4c9f230.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4fd2388.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3ba05f4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c905f4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c8b7be.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.PO#0065026.doc.exe.50fef18.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.3c94c1d.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.0.PO#0065026.doc.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3ba4c1d.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.4c9f230.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.3ba05f4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.PO#0065026.doc.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.PO#0065026.doc.exe.4f9f768.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000016.00000000.366825626.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.333627100.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.391042000.0000000002B51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.337826803.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.335589407.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.300740890.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.389921703.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000000.367777233.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.302917559.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.352052455.0000000004E90000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000000.369712840.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.366690953.0000000002C41000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.300022383.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.312409953.0000000004FF0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000000.365733325.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000000.336831952.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000000.301457212.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.363668804.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.375404860.0000000004B90000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.366795171.0000000003C49000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.391135988.0000000003B59000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 7096, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 5348, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 6712, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: PO#0065026.doc.exe PID: 7160, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1312, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6592, type: MEMORYSTR

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Process Injection111Masquerading12Input Capture11Security Software Discovery211Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection111NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information12DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing32Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 553030 Sample: PO#0065026.doc.exe Startdate: 14/01/2022 Architecture: WINDOWS Score: 100 51 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->51 53 Found malware configuration 2->53 55 Malicious sample detected (through community Yara rule) 2->55 57 17 other signatures 2->57 8 PO#0065026.doc.exe 3 2->8         started        12 PO#0065026.doc.exe 2 2->12         started        14 dhcpmon.exe 2 2->14         started        16 dhcpmon.exe 3 2->16         started        process3 file4 47 C:\Users\user\...\PO#0065026.doc.exe.log, ASCII 8->47 dropped 61 Detected unpacking (changes PE section rights) 8->61 63 Detected unpacking (overwrites its own PE header) 8->63 65 Uses schtasks.exe or at.exe to add and modify task schedules 8->65 18 PO#0065026.doc.exe 1 15 8->18         started        67 Injects a PE file into a foreign processes 12->67 23 PO#0065026.doc.exe 2 12->23         started        25 dhcpmon.exe 14->25         started        27 dhcpmon.exe 14->27         started        29 BackgroundTransferHost.exe 14->29         started        signatures5 process6 dnsIp7 49 185.140.53.132, 1604, 49744, 49747 DAVID_CRAIGGG Sweden 18->49 39 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->39 dropped 41 C:\Users\user\AppData\Roaming\...\run.dat, data 18->41 dropped 43 C:\Users\user\AppData\Local\...\tmp71C5.tmp, XML 18->43 dropped 45 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->45 dropped 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->59 31 schtasks.exe 1 18->31         started        33 schtasks.exe 1 18->33         started        file8 signatures9 process10 process11 35 conhost.exe 31->35         started        37 conhost.exe 33->37         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        PO#0065026.doc.exe23%ReversingLabsByteCode-MSIL.Trojan.NanoBot
        PO#0065026.doc.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe23%ReversingLabsByteCode-MSIL.Trojan.NanoBot

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        17.2.dhcpmon.exe.d0000.0.unpack100%AviraHEUR/AGEN.1109526Download File
        19.0.PO#0065026.doc.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        22.0.dhcpmon.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        19.0.PO#0065026.doc.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        10.0.PO#0065026.doc.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        19.0.PO#0065026.doc.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        10.0.PO#0065026.doc.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        19.0.PO#0065026.doc.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        19.0.PO#0065026.doc.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        10.0.PO#0065026.doc.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        22.0.dhcpmon.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        10.0.PO#0065026.doc.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.2.PO#0065026.doc.exe.ee0000.0.unpack100%AviraHEUR/AGEN.1109526Download File
        20.2.dhcpmon.exe.ba0000.0.unpack100%AviraHEUR/AGEN.1109526Download File
        22.0.dhcpmon.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        13.2.PO#0065026.doc.exe.f10000.0.unpack100%AviraHEUR/AGEN.1109526Download File
        22.0.dhcpmon.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        10.0.PO#0065026.doc.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        22.0.dhcpmon.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        22.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        19.2.PO#0065026.doc.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://www.jiyu-kobo.co.jp/uro0%Avira URL Cloudsafe
        http://www.carterandcone.comn-u0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/-hu0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cnaU0%Avira URL Cloudsafe
        http://www.fontbureau.comttod0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Y0/O0%Avira URL Cloudsafe
        http://www.fontbureau.comTTF0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.fontbureau.comitu/D0%Avira URL Cloudsafe
        http://www.fontbureau.comionaY0%Avira URL Cloudsafe
        http://www.fontbureau.comalsF0%URL Reputationsafe
        http://www.carterandcone.compef6K0%Avira URL Cloudsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.carterandcone.comaU0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/c0%URL Reputationsafe
        http://www.fontbureau.comcom0%URL Reputationsafe
        http://www.founder.com.cn/cnt0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.fontbureau.comcomFc0%Avira URL Cloudsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.galapagosdesign.com/CD0%Avira URL Cloudsafe
        http://www.sakkal.com0%URL Reputationsafe
        127.0.0.10%Avira URL Cloudsafe
        http://www.fontbureau.comalsd0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/hi0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Y0%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.fontbureau.comue0%URL Reputationsafe
        http://www.fontbureau.comF0%URL Reputationsafe
        http://www.fontbureau.comaO0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/V0%URL Reputationsafe
        http://www.carterandcone.comuesDK0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/O0%URL Reputationsafe
        http://www.galapagosdesign.com/V0%Avira URL Cloudsafe
        http://www.fontbureau.comaV0%Avira URL Cloudsafe
        http://www.fontbureau.comY0%Avira URL Cloudsafe
        http://www.fontbureau.comdc0%Avira URL Cloudsafe
        http://www.fontbureau.comda0%Avira URL Cloudsafe
        http://www.fontbureau.comzana0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/D0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.fontbureau.come.com0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/ite0%Avira URL Cloudsafe
        http://www.fontbureau.compe0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Y0-f0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.fontbureau.como0%URL Reputationsafe
        http://www.fontbureau.comFc0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/c0%URL Reputationsafe
        185.140.53.1320%Avira URL Cloudsafe
        http://www.fontbureau.commcom0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        No contacted domains info

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        127.0.0.1true
        • Avira URL Cloud: safe
        unknown
        185.140.53.132true
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.jiyu-kobo.co.jp/uroPO#0065026.doc.exe, 00000001.00000003.285170517.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284952891.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284921330.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284769961.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284991694.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285068399.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285040871.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285017058.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284892458.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285102887.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285137258.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284821861.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284860652.0000000008A91000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designersGPO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
          high
          http://www.carterandcone.comn-uPO#0065026.doc.exe, 00000001.00000003.282759013.0000000008A6F000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designers/?PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
            high
            http://www.founder.com.cn/cn/bThePO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers?PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
              high
              http://www.jiyu-kobo.co.jp/-huPO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.zhongyicts.com.cnaUPO#0065026.doc.exe, 00000001.00000003.281908317.0000000008A92000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designerslRPO#0065026.doc.exe, 00000001.00000003.286901024.0000000008A91000.00000004.00000001.sdmpfalse
                high
                http://www.fontbureau.comttodPO#0065026.doc.exe, 00000001.00000003.286901024.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287016720.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287120035.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286941238.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287248860.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287181413.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287057215.0000000008A91000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.tiro.comPO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designersPO#0065026.doc.exe, 00000001.00000003.292204726.0000000008A91000.00000004.00000001.sdmpfalse
                  high
                  http://www.jiyu-kobo.co.jp/Y0/OPO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284769961.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284892458.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284821861.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284860652.0000000008A91000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.comTTFPO#0065026.doc.exe, 00000001.00000003.285719117.0000000008A91000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.goodfont.co.krPO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.carterandcone.comPO#0065026.doc.exe, 00000001.00000003.282759013.0000000008A6F000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.comitu/DPO#0065026.doc.exe, 00000001.00000003.286497925.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286341063.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286591042.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286369233.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286312331.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286286284.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286398367.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286435701.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286622956.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286467614.0000000008A91000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.comionaYPO#0065026.doc.exe, 00000001.00000003.287917248.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287421417.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287520519.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287558454.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287600866.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287483541.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287840611.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.288037067.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287642342.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287684632.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287979043.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287768748.0000000008A91000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.com/designersUPO#0065026.doc.exe, 00000001.00000003.287349533.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287421417.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287302845.0000000008A91000.00000004.00000001.sdmpfalse
                    high
                    http://www.fontbureau.comalsFPO#0065026.doc.exe, 00000001.00000003.287016720.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287120035.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286941238.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287248860.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287181413.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287057215.0000000008A91000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.compef6KPO#0065026.doc.exe, 00000001.00000003.282759013.0000000008A6F000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.sajatypeworks.comPO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netDPO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/cThePO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmPO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.comPO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comaUPO#0065026.doc.exe, 00000001.00000003.281954598.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281931325.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281983436.0000000008A92000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/jp/cPO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.comcomPO#0065026.doc.exe, 00000001.00000003.286794704.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287349533.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286829225.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287917248.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287421417.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287520519.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286901024.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287016720.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287558454.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287600866.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287120035.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286941238.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287483541.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286863067.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287248860.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287840611.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287181413.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287642342.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287684632.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287768748.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287302845.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287057215.0000000008A91000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/frere-jones.htmlLPO#0065026.doc.exe, 00000001.00000003.286497925.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286341063.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286591042.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286369233.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286312331.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286286284.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286398367.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286435701.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286622956.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286467614.0000000008A91000.00000004.00000001.sdmpfalse
                      high
                      http://www.founder.com.cn/cntPO#0065026.doc.exe, 00000001.00000003.281456683.0000000008A94000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281463758.0000000008A94000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/DPleasePO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comcomFcPO#0065026.doc.exe, 00000001.00000003.286497925.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286341063.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286369233.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286312331.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286286284.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286398367.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286435701.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286467614.0000000008A91000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fonts.comPO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                        high
                        http://www.sandoll.co.krPO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.deDPleasePO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cnPO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designerspPO#0065026.doc.exe, 00000001.00000003.285859144.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285794499.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285814497.0000000008A91000.00000004.00000001.sdmpfalse
                          high
                          http://www.galapagosdesign.com/CDPO#0065026.doc.exe, 00000001.00000003.289557495.0000000008A76000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.sakkal.comPO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comalsdPO#0065026.doc.exe, 00000001.00000003.287349533.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287917248.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287421417.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287520519.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287558454.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287600866.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287483541.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287840611.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287642342.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287684632.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287768748.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287302845.0000000008A91000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/hiPO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283967988.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/YPO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283967988.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283755949.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281908317.0000000008A92000.00000004.00000001.sdmpfalse
                            high
                            http://www.fontbureau.comPO#0065026.doc.exe, 00000001.00000003.286220065.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286794704.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286168834.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286696568.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286025037.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286077095.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286757609.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285994377.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286497925.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285955232.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286144506.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286054615.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285719117.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286193130.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286111728.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286341063.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286591042.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286369233.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286312331.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286286284.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286398367.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286435701.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286622956.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286467614.0000000008A91000.00000004.00000001.sdmpfalse
                              high
                              http://www.galapagosdesign.com/PO#0065026.doc.exe, 00000001.00000003.289451558.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.289584198.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.289708771.0000000008A76000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.289557495.0000000008A76000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comuePO#0065026.doc.exe, 00000001.00000002.313547078.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292251947.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292352678.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292227161.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292325246.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.304155607.0000000008A91000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comFPO#0065026.doc.exe, 00000001.00000003.287302845.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287057215.0000000008A91000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comaOPO#0065026.doc.exe, 00000001.00000003.286220065.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286168834.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286696568.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286025037.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286077095.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286497925.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286144506.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286054615.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286193130.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286111728.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286341063.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286591042.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286369233.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286312331.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286286284.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286398367.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286435701.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286622956.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286467614.0000000008A91000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/VPO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.carterandcone.comuesDKPO#0065026.doc.exe, 00000001.00000003.282759013.0000000008A6F000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/OPO#0065026.doc.exe, 00000001.00000003.283755949.0000000008A91000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/VPO#0065026.doc.exe, 00000001.00000003.289747236.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.289451558.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.289584198.0000000008A91000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.comaVPO#0065026.doc.exe, 00000001.00000003.286794704.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287349533.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287917248.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287421417.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287520519.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287016720.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287558454.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287600866.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287120035.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286941238.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287483541.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287248860.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287840611.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287181413.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287642342.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287684632.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287768748.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287302845.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.287057215.0000000008A91000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.com/designers/i-f1PO#0065026.doc.exe, 00000001.00000003.285719117.0000000008A91000.00000004.00000001.sdmpfalse
                                high
                                http://www.fontbureau.comYPO#0065026.doc.exe, 00000001.00000002.313547078.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292251947.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292352678.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292227161.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292325246.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.304155607.0000000008A91000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.comdcPO#0065026.doc.exe, 00000001.00000003.286220065.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286168834.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286025037.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286077095.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285994377.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286144506.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286054615.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286193130.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286111728.0000000008A91000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.comdaPO#0065026.doc.exe, 00000001.00000003.285994377.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285955232.0000000008A91000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.comzanaPO#0065026.doc.exe, 00000001.00000003.286220065.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286168834.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286696568.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286025037.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286077095.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285994377.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286497925.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285955232.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286144506.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285877220.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286054615.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285859144.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286193130.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286111728.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286341063.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285794499.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286591042.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286369233.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286312331.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286286284.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286398367.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285894427.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286435701.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286622956.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285814497.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286467614.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285912034.0000000008A91000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/DPO#0065026.doc.exe, 00000001.00000003.285170517.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284952891.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284921330.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284769961.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284991694.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285068399.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285040871.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285017058.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284892458.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285102887.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285137258.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284821861.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284860652.0000000008A91000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/PO#0065026.doc.exe, 00000001.00000003.284952891.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284921330.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284769961.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284991694.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285068399.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285040871.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285017058.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283967988.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283755949.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284892458.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284821861.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284860652.0000000008A91000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comaPO#0065026.doc.exe, 00000001.00000003.292251947.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292352678.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292227161.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292325246.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292204726.0000000008A91000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.come.comPO#0065026.doc.exe, 00000001.00000003.286220065.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286168834.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286696568.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286025037.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286077095.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286497925.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286144506.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286054615.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286193130.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286111728.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286341063.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286591042.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286369233.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286312331.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286286284.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286398367.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286435701.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286622956.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286467614.0000000008A91000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comlPO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cn/PO#0065026.doc.exe, 00000001.00000003.281675789.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281341568.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281722139.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281766532.0000000008A76000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNPO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cnPO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281550617.0000000008A70000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281544705.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281564553.0000000008A93000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281675789.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281722139.0000000008A92000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.281496893.0000000008A70000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-jones.htmlPO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.jiyu-kobo.co.jp/itePO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.compePO#0065026.doc.exe, 00000001.00000003.285743125.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285794499.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285814497.0000000008A91000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/Y0-fPO#0065026.doc.exe, 00000001.00000003.284701634.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284506074.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284632097.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284414828.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284735895.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284663157.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284561577.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283325550.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284860652.0000000008A91000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comoPO#0065026.doc.exe, 00000001.00000003.285794499.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285814497.0000000008A91000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8PO#0065026.doc.exe, 00000001.00000002.313646282.0000000009C72000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.fontbureau.comFcPO#0065026.doc.exe, 00000001.00000003.286220065.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286168834.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286025037.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286077095.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.285994377.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286144506.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286054615.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286241958.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286193130.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.286111728.0000000008A91000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.jiyu-kobo.co.jp/cPO#0065026.doc.exe, 00000001.00000003.284027428.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283967988.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284264064.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.283755949.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284348337.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.284162420.0000000008A91000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/PO#0065026.doc.exe, 00000001.00000003.285719117.0000000008A91000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.fontbureau.commcomPO#0065026.doc.exe, 00000001.00000002.313547078.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292251947.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292352678.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292227161.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292325246.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.304155607.0000000008A91000.00000004.00000001.sdmp, PO#0065026.doc.exe, 00000001.00000003.292204726.0000000008A91000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown

                                        Contacted IPs

                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs

                                        Public

                                        IPDomainCountryFlagASNASN NameMalicious
                                        185.140.53.132
                                        unknownSweden
                                        209623DAVID_CRAIGGGtrue

                                        General Information

                                        Joe Sandbox Version:34.0.0 Boulder Opal
                                        Analysis ID:553030
                                        Start date:14.01.2022
                                        Start time:06:17:19
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:0h 13m 7s
                                        Hypervisor based Inspection enabled:false
                                        Report type:light
                                        Sample file name:PO#0065026.doc.exe
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                        Number of analysed new started processes analysed:34
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • HDC enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Detection:MAL
                                        Classification:mal100.troj.evad.winEXE@19/11@0/1
                                        EGA Information:
                                        • Successful, ratio: 71.4%
                                        HDC Information:
                                        • Successful, ratio: 3.1% (good quality ratio 1.6%)
                                        • Quality average: 30.1%
                                        • Quality standard deviation: 33.9%
                                        HCA Information:
                                        • Successful, ratio: 97%
                                        • Number of executed functions: 0
                                        • Number of non-executed functions: 0
                                        Cookbook Comments:
                                        • Adjust boot time
                                        • Enable AMSI
                                        • Found application associated with file extension: .exe
                                        Warnings:
                                        Show All
                                        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                        • TCP Packets have been reduced to 100
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                        • Excluded IPs from analysis (whitelisted): 23.211.4.86
                                        • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com
                                        • Execution Graph export aborted for target dhcpmon.exe, PID 6616 because there are no executed function
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                                        Simulations

                                        Behavior and APIs

                                        TimeTypeDescription
                                        06:18:18API Interceptor895x Sleep call for process: PO#0065026.doc.exe modified
                                        06:18:28Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\PO#0065026.doc.exe" s>$(Arg0)
                                        06:18:29AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        06:18:31Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                        06:18:37API Interceptor3x Sleep call for process: dhcpmon.exe modified

                                        Joe Sandbox View / Context

                                        IPs

                                        No context

                                        Domains

                                        No context

                                        ASN

                                        No context

                                        JA3 Fingerprints

                                        No context

                                        Dropped Files

                                        No context

                                        Created / dropped Files

                                        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Process:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):1605632
                                        Entropy (8bit):6.867701113625518
                                        Encrypted:false
                                        SSDEEP:24576:n4qAtkN+Nvs0rQp5bafs2OrHbja8+GefT1:nQkUNlrEbafcrHbja8+GefT
                                        MD5:233064525984666FE973125F4E60C903
                                        SHA1:91BEC44A6FF58C22CC58122B2DAAB04FD54DCF8E
                                        SHA-256:30E1BA61A63A27B668EEE09F960A83D944E878C33B46F85EA86BACDF1427F4DD
                                        SHA-512:9122F40F10F25B63362FF216E01A2E82271ED6CC9E81F8CB8D77FBD016FD50E11874E7D24A70C97004949E450589C015213DCA68ED7BB1FD7472B7CF24CE79ED
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 23%
                                        Reputation:unknown
                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a..............0.................. ........@.. ....................................@.................................x...S.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc...............~..............@..B........................H...........C......$...H2...v.............................................1o..s++./....5..30..+F..7P.#...d?...../)..V.B....-..v..A..FQ3..0...O.f.iw......7....dE.Q.[.......s.Y...^.].>.`...{x.......7...:l._(.F@.UE.s.\h.]...V.E..q....\.E'...+...,..R..A......,....[sAo.+...0.C....\..G.......;e..{..sD..........<Ju.......g`8>$)...i..Dqa/..........^...........6......_.....jy.=.F....D?..k.......].w....aF...D..h.l.>...C.....BX`.d."t..;.2.b...7g.[..y.+.....#...L
                                        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                        Process:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Reputation:unknown
                                        Preview: [ZoneTransfer]....ZoneId=0
                                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO#0065026.doc.exe.log
                                        Process:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1302
                                        Entropy (8bit):5.3499841584777394
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4bE4K5AE4Kzr7RKDE4KhK3VZ9pKhPKIE4oKFKHKorE4x84j:MIHK5HKXE1qHbHK5AHKzvRYHKhQnoPtW
                                        MD5:E2C3A19FF3EBB1649BF9F41DFE3B7E8F
                                        SHA1:5DA8AB9561D3C096BB9103413F64EE6E50D5AD88
                                        SHA-256:18E921771341555EF6167DEBBD7C83727518897E9B4B3545B7CCDB48E2043B74
                                        SHA-512:6B62A68EC358699D55E4CCD0BBDD4ADDC0F38641D82A019697893CEB503E853A5F087FAF9F4408425AD6631C9CBA31C3354FD98B45F051F2F59A0ECC3CA2FA06
                                        Malicious:true
                                        Reputation:unknown
                                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assem
                                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                                        Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1302
                                        Entropy (8bit):5.3499841584777394
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4bE4K5AE4Kzr7RKDE4KhK3VZ9pKhPKIE4oKFKHKorE4x84j:MIHK5HKXE1qHbHK5AHKzvRYHKhQnoPtW
                                        MD5:E2C3A19FF3EBB1649BF9F41DFE3B7E8F
                                        SHA1:5DA8AB9561D3C096BB9103413F64EE6E50D5AD88
                                        SHA-256:18E921771341555EF6167DEBBD7C83727518897E9B4B3545B7CCDB48E2043B74
                                        SHA-512:6B62A68EC358699D55E4CCD0BBDD4ADDC0F38641D82A019697893CEB503E853A5F087FAF9F4408425AD6631C9CBA31C3354FD98B45F051F2F59A0ECC3CA2FA06
                                        Malicious:false
                                        Reputation:unknown
                                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assem
                                        C:\Users\user\AppData\Local\Temp\tmp71C5.tmp
                                        Process:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1304
                                        Entropy (8bit):5.125174265894056
                                        Encrypted:false
                                        SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Dzxtn:cbk4oL600QydbQxIYODOLedq3Ezj
                                        MD5:D7630CB1A0DA72CB2D665DCB21B85C5C
                                        SHA1:62C73470FF8F388E106F6F06AE389987DC6E423F
                                        SHA-256:BDAB7EE10F2EC71260AC278E04869D1F9DF157CDC2BC6C6E76A01DCCE9685C0F
                                        SHA-512:EF37DEFF646A3F6DFFC33436706C9C084F59B6B4219FBD608E5B31DF32FC453D4FCD31A61C0F8F663E3E1DF9742A1FA59EAC766E457BDA6A5F62A3274C689ED5
                                        Malicious:true
                                        Reputation:unknown
                                        Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                        C:\Users\user\AppData\Local\Temp\tmp7E78.tmp
                                        Process:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1310
                                        Entropy (8bit):5.109425792877704
                                        Encrypted:false
                                        SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                        MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                        SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                        SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                        SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                        Malicious:false
                                        Reputation:unknown
                                        Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                        Process:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):232
                                        Entropy (8bit):7.024371743172393
                                        Encrypted:false
                                        SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                        MD5:32D0AAE13696FF7F8AF33B2D22451028
                                        SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                        SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                        SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                        Malicious:false
                                        Reputation:unknown
                                        Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                        Process:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):8
                                        Entropy (8bit):3.0
                                        Encrypted:false
                                        SSDEEP:3:Iz:Iz
                                        MD5:94CA9341866AED685B952D4AAA9879D0
                                        SHA1:80A1DFEED24F70C5DA45A82CC5FE6650A467B903
                                        SHA-256:6A1E2163FCEC87FE3D826AFC6F3791C90348D22C23332ABB4A82E50C38398113
                                        SHA-512:585EA033946428E92A89BDF3E4FED242ED0B86D93F46597667D6969AEFCAE8FE5EDA29F03B6F731489170DF3B0E6E52C1E6A57404AD525BCB105CBD86F2E5652
                                        Malicious:true
                                        Reputation:unknown
                                        Preview: ..h..H
                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                        Process:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        File Type:data
                                        Category:modified
                                        Size (bytes):40
                                        Entropy (8bit):5.153055907333276
                                        Encrypted:false
                                        SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                        MD5:4E5E92E2369688041CC82EF9650EDED2
                                        SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                        SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                        SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                        Malicious:false
                                        Reputation:unknown
                                        Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                        Process:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):327432
                                        Entropy (8bit):7.99938831605763
                                        Encrypted:true
                                        SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                        MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                        SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                        SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                        SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                        Malicious:false
                                        Reputation:unknown
                                        Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                        Process:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):41
                                        Entropy (8bit):4.491459931341817
                                        Encrypted:false
                                        SSDEEP:3:oNWXp5v1qbXhTn:oNWXpFgdT
                                        MD5:E155CE7B2273DFE68ACA42D13A0BCDD3
                                        SHA1:63D30E43FE6A829CE3AFF6F173C919A0090E49AB
                                        SHA-256:474F89C669509186781A2CAA73F699FE498A43E420A5484421AA7706ACB572CA
                                        SHA-512:4C884C6E632E6072087174692102A215DF27B67BD2A97566DFDA14EC15ED05A13C53085F100A600A45B44BDBBCB56BE79B04B542BAF355301F0A1A5AF2E07016
                                        Malicious:false
                                        Reputation:unknown
                                        Preview: C:\Users\user\Desktop\PO#0065026.doc.exe

                                        Static File Info

                                        General

                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):6.867701113625518
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        File name:PO#0065026.doc.exe
                                        File size:1605632
                                        MD5:233064525984666fe973125f4e60c903
                                        SHA1:91bec44a6ff58c22cc58122b2daab04fd54dcf8e
                                        SHA256:30e1ba61a63a27b668eee09f960a83d944e878c33b46f85ea86bacdf1427f4dd
                                        SHA512:9122f40f10f25b63362ff216e01a2e82271ed6cc9e81f8cb8d77fbd016fd50e11874e7d24a70c97004949e450589c015213dca68ed7bb1fd7472b7cf24ce79ed
                                        SSDEEP:24576:n4qAtkN+Nvs0rQp5bafs2OrHbja8+GefT1:nQkUNlrEbafcrHbja8+GefT
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a..............0.................. ........@.. ....................................@................................

                                        File Icon

                                        Icon Hash:d8993890949c64a4

                                        Static PE Info

                                        General

                                        Entrypoint:0x52ecce
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                        Time Stamp:0x61E0F8C7 [Fri Jan 14 04:15:03 2022 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:v4.0.30319
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                        Entrypoint Preview

                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al

                                        Data Directories

                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x12ec780x53.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1300000x5ad08.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x18c0000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                        Sections

                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000x12ccd40x12ce00False0.624642968425data7.06155313656IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                        .rsrc0x1300000x5ad080x5ae00False0.280215676582data5.3185705094IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x18c0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                        Resources

                                        NameRVASizeTypeLanguageCountry
                                        RT_ICON0x1302200x42028dBase III DBT, version number 0, next free block index 40
                                        RT_ICON0x1722480x468GLS_BINARY_LSB_FIRST
                                        RT_ICON0x1726b00x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                        RT_ICON0x174c580x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 1410695323, next used block 756847541
                                        RT_ICON0x175d000x10828dBase III DBT, version number 0, next free block index 40
                                        RT_ICON0x1865280x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                                        RT_GROUP_ICON0x18a7500x5adata
                                        RT_VERSION0x18a7ac0x36edata
                                        RT_MANIFEST0x18ab1c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                        Imports

                                        DLLImport
                                        mscoree.dll_CorExeMain

                                        Version Infos

                                        DescriptionData
                                        Translation0x0000 0x04b0
                                        LegalCopyrightIdeal Garden 2021 (C)
                                        Assembly Version2.7.7.18
                                        InternalNameDelegateEnt.exe
                                        FileVersion2.7.7.18
                                        CompanyNameIdeal Garden
                                        LegalTrademarks
                                        Comments2014 Porsche Boxster
                                        ProductNamePattern
                                        ProductVersion2.7.7.18
                                        FileDescriptionPattern
                                        OriginalFilenameDelegateEnt.exe

                                        Network Behavior

                                        Snort IDS Alerts

                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                        01/14/22-06:18:31.903919TCP2025019ET TROJAN Possible NanoCore C2 60B497441604192.168.2.3185.140.53.132
                                        01/14/22-06:18:38.386653TCP2025019ET TROJAN Possible NanoCore C2 60B497471604192.168.2.3185.140.53.132
                                        01/14/22-06:18:45.673562TCP2025019ET TROJAN Possible NanoCore C2 60B497481604192.168.2.3185.140.53.132
                                        01/14/22-06:18:51.870370TCP2025019ET TROJAN Possible NanoCore C2 60B497491604192.168.2.3185.140.53.132
                                        01/14/22-06:18:57.991593TCP2025019ET TROJAN Possible NanoCore C2 60B497501604192.168.2.3185.140.53.132
                                        01/14/22-06:19:03.949221TCP2025019ET TROJAN Possible NanoCore C2 60B497521604192.168.2.3185.140.53.132
                                        01/14/22-06:19:10.637670TCP2025019ET TROJAN Possible NanoCore C2 60B497691604192.168.2.3185.140.53.132
                                        01/14/22-06:19:16.757844TCP2025019ET TROJAN Possible NanoCore C2 60B497881604192.168.2.3185.140.53.132
                                        01/14/22-06:19:22.767026TCP2025019ET TROJAN Possible NanoCore C2 60B497941604192.168.2.3185.140.53.132
                                        01/14/22-06:19:28.811657TCP2025019ET TROJAN Possible NanoCore C2 60B497961604192.168.2.3185.140.53.132
                                        01/14/22-06:19:35.076661TCP2025019ET TROJAN Possible NanoCore C2 60B498111604192.168.2.3185.140.53.132
                                        01/14/22-06:19:42.006820TCP2025019ET TROJAN Possible NanoCore C2 60B498201604192.168.2.3185.140.53.132
                                        01/14/22-06:19:48.060858TCP2025019ET TROJAN Possible NanoCore C2 60B498221604192.168.2.3185.140.53.132
                                        01/14/22-06:19:53.986644TCP2025019ET TROJAN Possible NanoCore C2 60B498231604192.168.2.3185.140.53.132
                                        01/14/22-06:20:00.581076TCP2025019ET TROJAN Possible NanoCore C2 60B498241604192.168.2.3185.140.53.132
                                        01/14/22-06:20:07.178570TCP2025019ET TROJAN Possible NanoCore C2 60B498251604192.168.2.3185.140.53.132
                                        01/14/22-06:20:13.191702TCP2025019ET TROJAN Possible NanoCore C2 60B498261604192.168.2.3185.140.53.132

                                        Network Port Distribution

                                        TCP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 14, 2022 06:18:31.737394094 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:31.849764109 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:31.849905014 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:31.903918982 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.019398928 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.036901951 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.149451971 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.192706108 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.256220102 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.420372963 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.420475960 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.562447071 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.562467098 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.562483072 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.562541008 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.562571049 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.562623978 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.674901962 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.674927950 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.674946070 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.674962044 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.674977064 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.675065994 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.675074100 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.675110102 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.675113916 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.675158978 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.675177097 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.675215006 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.787514925 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.787535906 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.787550926 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.787589073 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.787604094 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.787621975 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.787666082 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.787689924 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.787713051 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.787738085 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.787755013 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.787832022 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.787852049 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.787882090 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.787930965 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.787966967 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.788002014 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.788085938 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.788116932 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.788124084 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.788135052 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.788162947 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.788172960 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.788193941 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.899821043 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.899842024 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.899883986 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.899897099 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.899983883 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900043964 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.900047064 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900125027 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900183916 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.900249004 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900326967 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900369883 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900409937 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.900490999 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900532961 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.900576115 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900592089 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900635958 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.900648117 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900677919 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900727987 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900763988 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900803089 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900805950 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.900836945 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.900851011 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900885105 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900895119 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.900918961 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900934935 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.900970936 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.901014090 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.901030064 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.901062012 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.901098013 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.901114941 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.901144981 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.901164055 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.901209116 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.901210070 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.901256084 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.901284933 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.901300907 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.901314020 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.901319027 CET160449744185.140.53.132192.168.2.3
                                        Jan 14, 2022 06:18:32.901341915 CET497441604192.168.2.3185.140.53.132
                                        Jan 14, 2022 06:18:32.901365995 CET160449744185.140.53.132192.168.2.3

                                        Code Manipulations

                                        Statistics

                                        Behavior

                                        Click to jump to process

                                        System Behavior

                                        General

                                        Start time:06:18:09
                                        Start date:14/01/2022
                                        Path:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\PO#0065026.doc.exe"
                                        Imagebase:0xee0000
                                        File size:1605632 bytes
                                        MD5 hash:233064525984666FE973125F4E60C903
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.312409953.0000000004FF0000.00000004.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.312409953.0000000004FF0000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.312409953.0000000004FF0000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.306051032.0000000003510000.00000004.00000001.sdmp, Author: Joe Security
                                        Reputation:low

                                        General

                                        Start time:06:18:19
                                        Start date:14/01/2022
                                        Path:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        Imagebase:0x950000
                                        File size:1605632 bytes
                                        MD5 hash:233064525984666FE973125F4E60C903
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.300740890.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.300740890.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.300740890.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.302917559.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.302917559.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.302917559.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.300022383.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.300022383.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.300022383.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.301457212.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.301457212.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.301457212.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        Reputation:low

                                        General

                                        Start time:06:18:25
                                        Start date:14/01/2022
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp71C5.tmp
                                        Imagebase:0xef0000
                                        File size:185856 bytes
                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        General

                                        Start time:06:18:27
                                        Start date:14/01/2022
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7f20f0000
                                        File size:625664 bytes
                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        General

                                        Start time:06:18:28
                                        Start date:14/01/2022
                                        Path:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\PO#0065026.doc.exe 0
                                        Imagebase:0xf10000
                                        File size:1605632 bytes
                                        MD5 hash:233064525984666FE973125F4E60C903
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.352052455.0000000004E90000.00000004.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.352052455.0000000004E90000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.352052455.0000000004E90000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000D.00000002.342454786.00000000033B0000.00000004.00000001.sdmp, Author: Joe Security
                                        Reputation:low

                                        General

                                        Start time:06:18:29
                                        Start date:14/01/2022
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp7E78.tmp
                                        Imagebase:0xef0000
                                        File size:185856 bytes
                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        General

                                        Start time:06:18:29
                                        Start date:14/01/2022
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7f20f0000
                                        File size:625664 bytes
                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        General

                                        Start time:06:18:31
                                        Start date:14/01/2022
                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                        Imagebase:0xd0000
                                        File size:1605632 bytes
                                        MD5 hash:233064525984666FE973125F4E60C903
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000011.00000002.340545804.0000000002610000.00000004.00000001.sdmp, Author: Joe Security
                                        Antivirus matches:
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 23%, ReversingLabs
                                        Reputation:low

                                        General

                                        Start time:06:18:33
                                        Start date:14/01/2022
                                        Path:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\PO#0065026.doc.exe
                                        Imagebase:0x6c0000
                                        File size:1605632 bytes
                                        MD5 hash:233064525984666FE973125F4E60C903
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000000.333627100.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000000.333627100.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000013.00000000.333627100.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000000.337826803.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000000.337826803.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000013.00000000.337826803.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000000.335589407.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000000.335589407.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000013.00000000.335589407.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.366690953.0000000002C41000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.366690953.0000000002C41000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000000.336831952.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000000.336831952.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000013.00000000.336831952.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.363668804.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.363668804.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.363668804.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.366795171.0000000003C49000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.366795171.0000000003C49000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        Reputation:low

                                        General

                                        Start time:06:18:37
                                        Start date:14/01/2022
                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                        Imagebase:0xba0000
                                        File size:1605632 bytes
                                        MD5 hash:233064525984666FE973125F4E60C903
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000014.00000002.373248632.00000000030B0000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.375404860.0000000004B90000.00000004.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.375404860.0000000004B90000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.375404860.0000000004B90000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        Reputation:low

                                        General

                                        Start time:06:18:47
                                        Start date:14/01/2022
                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Imagebase:0x210000
                                        File size:1605632 bytes
                                        MD5 hash:233064525984666FE973125F4E60C903
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:low

                                        General

                                        Start time:06:18:48
                                        Start date:14/01/2022
                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Imagebase:0x530000
                                        File size:1605632 bytes
                                        MD5 hash:233064525984666FE973125F4E60C903
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000000.366825626.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000000.366825626.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000016.00000000.366825626.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.391042000.0000000002B51000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.391042000.0000000002B51000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000002.389921703.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.389921703.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.389921703.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000000.367777233.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000000.367777233.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000016.00000000.367777233.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000000.369712840.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000000.369712840.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000016.00000000.369712840.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000000.365733325.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000000.365733325.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000016.00000000.365733325.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.391135988.0000000003B59000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.391135988.0000000003B59000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        Reputation:low

                                        General

                                        Start time:06:19:27
                                        Start date:14/01/2022
                                        Path:C:\Windows\System32\BackgroundTransferHost.exe
                                        Wow64 process (32bit):false
                                        Commandline:"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                        Imagebase:0x7ff62a980000
                                        File size:36864 bytes
                                        MD5 hash:02BA81746B929ECC9DB6665589B68335
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate

                                        Disassembly

                                        Code Analysis

                                        Reset < >