Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
U7Ncg7oAyC.exe

Overview

General Information

Sample Name:U7Ncg7oAyC.exe
Analysis ID:623790
MD5:1d2ca2d522f8f4e99609cf7e88e673b4
SHA1:7754eade48451776ab6109a0c584573780a4f531
SHA256:26e6fe6c78632392c446e53eb0779ec99e0864d09265b9dda557763629ef3396
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Connects to many ports of the same IP (likely port scanning)
Protects its processes via BreakOnTermination flag
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • U7Ncg7oAyC.exe (PID: 6284 cmdline: "C:\Users\user\Desktop\U7Ncg7oAyC.exe" MD5: 1D2CA2D522F8F4E99609CF7E88E673B4)
    • powershell.exe (PID: 6456 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 6476 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmp43AF.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • U7Ncg7oAyC.exe (PID: 6752 cmdline: C:\Users\user\Desktop\U7Ncg7oAyC.exe MD5: 1D2CA2D522F8F4E99609CF7E88E673B4)
      • schtasks.exe (PID: 4132 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp6DAD.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 1328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 4352 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp7772.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 3572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • U7Ncg7oAyC.exe (PID: 2860 cmdline: C:\Users\user\Desktop\U7Ncg7oAyC.exe 0 MD5: 1D2CA2D522F8F4E99609CF7E88E673B4)
    • powershell.exe (PID: 5684 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 4948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 6168 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF4.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • U7Ncg7oAyC.exe (PID: 6568 cmdline: C:\Users\user\Desktop\U7Ncg7oAyC.exe MD5: 1D2CA2D522F8F4E99609CF7E88E673B4)
  • dhcpmon.exe (PID: 5308 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: 1D2CA2D522F8F4E99609CF7E88E673B4)
    • powershell.exe (PID: 6944 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 1556 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmpE07C.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 640 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 1D2CA2D522F8F4E99609CF7E88E673B4)
  • dhcpmon.exe (PID: 5256 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 1D2CA2D522F8F4E99609CF7E88E673B4)
    • powershell.exe (PID: 6560 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5920 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 4144 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmpFF8.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 3348 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 1D2CA2D522F8F4E99609CF7E88E673B4)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000000.298686733.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000006.00000000.298686733.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000006.00000000.298686733.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000022.00000000.386853119.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000022.00000000.386853119.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 121 entries
      SourceRuleDescriptionAuthorStrings
      24.2.dhcpmon.exe.43a9e90.10.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x467ad:$x1: NanoCore.ClientPluginHost
      • 0x7afcd:$x1: NanoCore.ClientPluginHost
      • 0xaf5ed:$x1: NanoCore.ClientPluginHost
      • 0x467ea:$x2: IClientNetworkHost
      • 0x7b00a:$x2: IClientNetworkHost
      • 0xaf62a:$x2: IClientNetworkHost
      • 0x4a31d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      • 0x7eb3d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      • 0xb315d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      24.2.dhcpmon.exe.43a9e90.10.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        24.2.dhcpmon.exe.43a9e90.10.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
        • 0x46515:$x1: NanoCore Client
        • 0x46525:$x1: NanoCore Client
        • 0x7ad35:$x1: NanoCore Client
        • 0x7ad45:$x1: NanoCore Client
        • 0xaf355:$x1: NanoCore Client
        • 0xaf365:$x1: NanoCore Client
        • 0x4676d:$x2: NanoCore.ClientPlugin
        • 0x7af8d:$x2: NanoCore.ClientPlugin
        • 0xaf5ad:$x2: NanoCore.ClientPlugin
        • 0x467ad:$x3: NanoCore.ClientPluginHost
        • 0x7afcd:$x3: NanoCore.ClientPluginHost
        • 0xaf5ed:$x3: NanoCore.ClientPluginHost
        • 0x46762:$i1: IClientApp
        • 0x7af82:$i1: IClientApp
        • 0xaf5a2:$i1: IClientApp
        • 0x46783:$i2: IClientData
        • 0x7afa3:$i2: IClientData
        • 0xaf5c3:$i2: IClientData
        • 0x4678f:$i3: IClientNetwork
        • 0x7afaf:$i3: IClientNetwork
        • 0xaf5cf:$i3: IClientNetwork
        24.2.dhcpmon.exe.43a9e90.10.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0x46515:$a: NanoCore
        • 0x46525:$a: NanoCore
        • 0x46759:$a: NanoCore
        • 0x4676d:$a: NanoCore
        • 0x467ad:$a: NanoCore
        • 0x7ad35:$a: NanoCore
        • 0x7ad45:$a: NanoCore
        • 0x7af79:$a: NanoCore
        • 0x7af8d:$a: NanoCore
        • 0x7afcd:$a: NanoCore
        • 0xaf355:$a: NanoCore
        • 0xaf365:$a: NanoCore
        • 0xaf599:$a: NanoCore
        • 0xaf5ad:$a: NanoCore
        • 0xaf5ed:$a: NanoCore
        • 0x46574:$b: ClientPlugin
        • 0x46776:$b: ClientPlugin
        • 0x467b6:$b: ClientPlugin
        • 0x7ad94:$b: ClientPlugin
        • 0x7af96:$b: ClientPlugin
        • 0x7afd6:$b: ClientPlugin
        30.2.U7Ncg7oAyC.exe.433b041.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xd9ad:$x1: NanoCore.ClientPluginHost
        • 0xd9da:$x2: IClientNetworkHost
        Click to see the 285 entries

        AV Detection

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\U7Ncg7oAyC.exe, ProcessId: 6752, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\U7Ncg7oAyC.exe, ProcessId: 6752, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\U7Ncg7oAyC.exe, ProcessId: 6752, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\U7Ncg7oAyC.exe, ProcessId: 6752, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: U7Ncg7oAyC.exeVirustotal: Detection: 43%Perma Link
        Source: U7Ncg7oAyC.exeReversingLabs: Detection: 63%
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 63%
        Source: C:\Users\user\AppData\Roaming\LYKZypsugb.exeReversingLabs: Detection: 63%
        Source: Yara matchFile source: 24.2.dhcpmon.exe.43a9e90.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.433b041.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f3560b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.44104b0.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4dd04b0.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aab041.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.4414cd0.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.52c4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4d99e90.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.43e04b0.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4e04cd0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4ab9e90.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.52c0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f3b041.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.433560b.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.433b041.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4e04cd0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.43e04b0.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.4414cd0.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aab041.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f3b041.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.44104b0.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f307ce.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.52c0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.43d9e90.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aa560b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.43307ce.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4dd04b0.12.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000006.00000000.298686733.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.386853119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.389457782.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000002.453407372.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000000.301869693.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.379537717.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000000.300964814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.429959186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.432551676.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.422202899.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000002.450934240.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.432713600.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.420827923.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.419127267.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000000.299335853.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.411971893.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.376862241.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.517591077.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.394464414.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.378843242.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.434654746.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.521004165.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.423439487.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.513680149.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.409136026.00000000043D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.373615736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.419521578.0000000004D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.393280850.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000002.453640867.0000000004069000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.310994827.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 6284, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 6752, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 2860, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5308, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5256, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 6568, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 640, type: MEMORYSTR
        Source: U7Ncg7oAyC.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\LYKZypsugb.exeJoe Sandbox ML: detected
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Source: 24.2.dhcpmon.exe.3b0000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2
        Source: 30.0.U7Ncg7oAyC.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 34.0.dhcpmon.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 34.0.dhcpmon.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 30.0.U7Ncg7oAyC.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 6.0.U7Ncg7oAyC.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 34.0.dhcpmon.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 19.2.U7Ncg7oAyC.exe.420000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2
        Source: 30.0.U7Ncg7oAyC.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 34.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 30.0.U7Ncg7oAyC.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 6.0.U7Ncg7oAyC.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 6.2.U7Ncg7oAyC.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 0.2.U7Ncg7oAyC.exe.b80000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2
        Source: 34.0.dhcpmon.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 30.0.U7Ncg7oAyC.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 22.2.dhcpmon.exe.cf0000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2
        Source: 30.2.U7Ncg7oAyC.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 34.0.dhcpmon.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 6.2.U7Ncg7oAyC.exe.52c0000.10.unpackAvira: Label: TR/NanoCore.fadte

        Compliance

        barindex
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeUnpacked PE file: 0.2.U7Ncg7oAyC.exe.b80000.0.unpack
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeUnpacked PE file: 19.2.U7Ncg7oAyC.exe.420000.0.unpack
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeUnpacked PE file: 22.2.dhcpmon.exe.cf0000.0.unpack
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeUnpacked PE file: 24.2.dhcpmon.exe.3b0000.0.unpack
        Source: U7Ncg7oAyC.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: U7Ncg7oAyC.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: U7Ncg7oAyC.exe, 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmp, U7Ncg7oAyC.exe, 00000006.00000002.517591077.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, U7Ncg7oAyC.exe, 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, U7Ncg7oAyC.exe, 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000022.00000002.432551676.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000022.00000002.432713600.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 4x nop then push dword ptr [ebp-24h]19_2_07E04F40
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh19_2_07E04F40
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 4x nop then xor edx, edx19_2_07E04E78
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h19_2_07E04AB0
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 4x nop then push dword ptr [ebp-24h]19_2_07E04F3B
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh19_2_07E04F3B
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 4x nop then xor edx, edx19_2_07E04E6C
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 4x nop then push dword ptr [ebp-20h]19_2_07E04C20
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh19_2_07E04C20
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 4x nop then push dword ptr [ebp-20h]19_2_07E04C14
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh19_2_07E04C14
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h19_2_07E04AA7
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]24_2_04E194D8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]24_2_04E17B3C

        Networking

        barindex
        Source: global trafficTCP traffic: 102.89.42.162 ports 54761,1,4,5,6,7
        Source: global trafficTCP traffic: 185.19.85.160 ports 54761,1,4,5,6,7
        Source: global trafficTCP traffic: 192.168.2.4:49763 -> 102.89.42.162:54761
        Source: global trafficTCP traffic: 192.168.2.4:49778 -> 185.19.85.160:54761
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.160
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.160
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.160
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.160
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.160
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.160
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.160
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.160
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.160
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
        Source: U7Ncg7oAyC.exe, 00000000.00000002.306915424.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, U7Ncg7oAyC.exe, 00000013.00000002.384938469.0000000002831000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000016.00000002.410739421.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000018.00000002.427276046.0000000002801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: unknownDNS traffic detected: queries for: fastspeed.ddnsfree.com
        Source: U7Ncg7oAyC.exe, 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 24.2.dhcpmon.exe.43a9e90.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.433b041.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f3560b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.44104b0.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4dd04b0.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aab041.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.4414cd0.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.52c4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4d99e90.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.43e04b0.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4e04cd0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4ab9e90.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.52c0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f3b041.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.433560b.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.433b041.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4e04cd0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.43e04b0.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.4414cd0.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aab041.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f3b041.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.44104b0.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f307ce.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.52c0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.43d9e90.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aa560b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.43307ce.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4dd04b0.12.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000006.00000000.298686733.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.386853119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.389457782.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000002.453407372.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000000.301869693.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.379537717.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000000.300964814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.429959186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.432551676.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.422202899.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000002.450934240.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.432713600.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.420827923.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.419127267.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000000.299335853.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.411971893.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.376862241.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.517591077.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.394464414.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.378843242.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.434654746.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.521004165.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.423439487.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.513680149.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.409136026.00000000043D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.373615736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.419521578.0000000004D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.393280850.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000002.453640867.0000000004069000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.310994827.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 6284, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 6752, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 2860, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5308, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5256, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 6568, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 640, type: MEMORYSTR

        Operating System Destruction

        barindex
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: 01 00 00 00 Jump to behavior

        System Summary

        barindex
        Source: 24.2.dhcpmon.exe.43a9e90.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.2.dhcpmon.exe.43a9e90.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 24.2.dhcpmon.exe.43a9e90.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.2.U7Ncg7oAyC.exe.433b041.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.2.U7Ncg7oAyC.exe.433b041.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 34.2.dhcpmon.exe.3f3560b.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 34.2.dhcpmon.exe.3f3560b.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 34.2.dhcpmon.exe.3f3560b.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.U7Ncg7oAyC.exe.44104b0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.U7Ncg7oAyC.exe.44104b0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 19.2.U7Ncg7oAyC.exe.44104b0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.2.U7Ncg7oAyC.exe.3349530.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.2.U7Ncg7oAyC.exe.3349530.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 34.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 34.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 34.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.2.dhcpmon.exe.4dd04b0.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.dhcpmon.exe.4dd04b0.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 22.2.dhcpmon.exe.4dd04b0.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.2.U7Ncg7oAyC.exe.3349530.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.2.U7Ncg7oAyC.exe.3349530.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.U7Ncg7oAyC.exe.3aab041.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.U7Ncg7oAyC.exe.3aab041.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 24.2.dhcpmon.exe.4414cd0.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.2.dhcpmon.exe.4414cd0.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 24.2.dhcpmon.exe.4414cd0.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.U7Ncg7oAyC.exe.2aa9d50.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.U7Ncg7oAyC.exe.2aa9d50.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 30.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 34.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 34.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 34.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 30.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.U7Ncg7oAyC.exe.52c4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.U7Ncg7oAyC.exe.52c4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 22.2.dhcpmon.exe.4d99e90.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.dhcpmon.exe.4d99e90.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 22.2.dhcpmon.exe.4d99e90.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.U7Ncg7oAyC.exe.2aa4ef0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.U7Ncg7oAyC.exe.2aa4ef0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 34.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 34.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 34.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 24.2.dhcpmon.exe.43e04b0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.2.dhcpmon.exe.43e04b0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 24.2.dhcpmon.exe.43e04b0.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.2.U7Ncg7oAyC.exe.334e590.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.2.U7Ncg7oAyC.exe.334e590.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 22.2.dhcpmon.exe.4e04cd0.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.dhcpmon.exe.4e04cd0.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 22.2.dhcpmon.exe.4e04cd0.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 34.2.dhcpmon.exe.3f307ce.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 34.2.dhcpmon.exe.3f307ce.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 34.2.dhcpmon.exe.2f49658.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 34.2.dhcpmon.exe.2f49658.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 34.2.dhcpmon.exe.2f4e6b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 34.2.dhcpmon.exe.2f4e6b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.U7Ncg7oAyC.exe.4ab9e90.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.U7Ncg7oAyC.exe.4ab9e90.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.U7Ncg7oAyC.exe.4ab9e90.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.2.U7Ncg7oAyC.exe.43307ce.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.2.U7Ncg7oAyC.exe.43307ce.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.2.U7Ncg7oAyC.exe.52c0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.U7Ncg7oAyC.exe.52c0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 34.2.dhcpmon.exe.3f3b041.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 34.2.dhcpmon.exe.3f3b041.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 30.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 30.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.U7Ncg7oAyC.exe.2aa4ef0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.U7Ncg7oAyC.exe.2aa4ef0.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.2.U7Ncg7oAyC.exe.5160000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.U7Ncg7oAyC.exe.5160000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.2.U7Ncg7oAyC.exe.433560b.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.2.U7Ncg7oAyC.exe.433560b.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 30.2.U7Ncg7oAyC.exe.433560b.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.2.U7Ncg7oAyC.exe.433b041.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.2.U7Ncg7oAyC.exe.433b041.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 34.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 34.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 34.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 30.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.2.dhcpmon.exe.4e04cd0.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.dhcpmon.exe.4e04cd0.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 22.2.dhcpmon.exe.4e04cd0.11.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 24.2.dhcpmon.exe.43e04b0.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.2.dhcpmon.exe.43e04b0.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 24.2.dhcpmon.exe.43e04b0.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 24.2.dhcpmon.exe.4414cd0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.2.dhcpmon.exe.4414cd0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 24.2.dhcpmon.exe.4414cd0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 30.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.U7Ncg7oAyC.exe.3aab041.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.U7Ncg7oAyC.exe.3aab041.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.2.U7Ncg7oAyC.exe.5140000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.U7Ncg7oAyC.exe.5140000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 34.2.dhcpmon.exe.3f3b041.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 34.2.dhcpmon.exe.3f3b041.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 19.2.U7Ncg7oAyC.exe.44104b0.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.U7Ncg7oAyC.exe.44104b0.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 19.2.U7Ncg7oAyC.exe.44104b0.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 34.2.dhcpmon.exe.2f49658.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 34.2.dhcpmon.exe.2f49658.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 34.2.dhcpmon.exe.3f307ce.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 34.2.dhcpmon.exe.3f307ce.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 34.2.dhcpmon.exe.3f307ce.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.U7Ncg7oAyC.exe.52c0000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.U7Ncg7oAyC.exe.52c0000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 19.2.U7Ncg7oAyC.exe.43d9e90.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.U7Ncg7oAyC.exe.43d9e90.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 19.2.U7Ncg7oAyC.exe.43d9e90.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.U7Ncg7oAyC.exe.3aa560b.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.U7Ncg7oAyC.exe.3aa560b.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.2.U7Ncg7oAyC.exe.3aa560b.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.2.U7Ncg7oAyC.exe.43307ce.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.2.U7Ncg7oAyC.exe.43307ce.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 30.2.U7Ncg7oAyC.exe.43307ce.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 34.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 34.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 34.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.2.dhcpmon.exe.4dd04b0.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.dhcpmon.exe.4dd04b0.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 22.2.dhcpmon.exe.4dd04b0.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000000.298686733.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000000.298686733.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000022.00000000.386853119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000022.00000000.386853119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000022.00000000.389457782.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000022.00000000.389457782.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000027.00000002.453407372.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000000.301869693.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000000.301869693.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000000.379537717.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000000.379537717.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000000.300964814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000000.300964814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000022.00000002.429959186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000022.00000002.429959186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000022.00000002.432551676.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.520939639.0000000005160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.520939639.0000000005160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000027.00000000.422202899.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000027.00000000.422202899.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000027.00000002.450934240.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000027.00000002.450934240.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000022.00000002.432713600.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000027.00000000.420827923.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000027.00000000.420827923.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000027.00000000.419127267.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000027.00000000.419127267.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.520899025.0000000005140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.520899025.0000000005140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000006.00000000.299335853.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000000.299335853.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000002.411971893.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000002.411971893.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000000.376862241.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000000.376862241.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000022.00000000.394464414.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000022.00000000.394464414.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000000.378843242.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000000.378843242.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000018.00000002.434654746.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000018.00000002.434654746.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.521004165.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.521004165.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000027.00000000.423439487.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000027.00000000.423439487.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.513680149.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.513680149.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.409136026.00000000043D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000013.00000002.409136026.00000000043D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000000.373615736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000000.373615736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000002.419521578.0000000004D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000016.00000002.419521578.0000000004D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000022.00000000.393280850.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000022.00000000.393280850.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000027.00000002.453640867.0000000004069000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.310994827.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.310994827.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 6284, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 6284, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 6752, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 6752, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 2860, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 2860, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 5308, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 5308, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 5256, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 5256, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 6568, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 6568, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 640, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 640, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: U7Ncg7oAyC.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 24.2.dhcpmon.exe.43a9e90.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.dhcpmon.exe.43a9e90.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 24.2.dhcpmon.exe.43a9e90.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.2.U7Ncg7oAyC.exe.433b041.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.2.U7Ncg7oAyC.exe.433b041.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 30.2.U7Ncg7oAyC.exe.433b041.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 34.2.dhcpmon.exe.3f3560b.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 34.2.dhcpmon.exe.3f3560b.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 34.2.dhcpmon.exe.3f3560b.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 34.2.dhcpmon.exe.3f3560b.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.U7Ncg7oAyC.exe.44104b0.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.U7Ncg7oAyC.exe.44104b0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 19.2.U7Ncg7oAyC.exe.44104b0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.2.U7Ncg7oAyC.exe.3349530.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.2.U7Ncg7oAyC.exe.3349530.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 30.2.U7Ncg7oAyC.exe.3349530.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 34.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 34.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 34.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 34.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.2.dhcpmon.exe.4dd04b0.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.dhcpmon.exe.4dd04b0.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 22.2.dhcpmon.exe.4dd04b0.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 22.2.dhcpmon.exe.4dd04b0.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.2.U7Ncg7oAyC.exe.3349530.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.2.U7Ncg7oAyC.exe.3349530.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 30.2.U7Ncg7oAyC.exe.3349530.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.3aab041.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.U7Ncg7oAyC.exe.3aab041.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.U7Ncg7oAyC.exe.3aab041.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 24.2.dhcpmon.exe.4414cd0.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.dhcpmon.exe.4414cd0.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 24.2.dhcpmon.exe.4414cd0.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 24.2.dhcpmon.exe.4414cd0.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.2aa9d50.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.U7Ncg7oAyC.exe.2aa9d50.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.U7Ncg7oAyC.exe.2aa9d50.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 30.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 30.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 34.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 34.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 34.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 34.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 30.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 30.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.52c4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.U7Ncg7oAyC.exe.52c4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.U7Ncg7oAyC.exe.52c4629.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 22.2.dhcpmon.exe.4d99e90.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.dhcpmon.exe.4d99e90.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 22.2.dhcpmon.exe.4d99e90.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.2aa4ef0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.U7Ncg7oAyC.exe.2aa4ef0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.U7Ncg7oAyC.exe.2aa4ef0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 34.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 34.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 34.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 34.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 24.2.dhcpmon.exe.43e04b0.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.dhcpmon.exe.43e04b0.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 24.2.dhcpmon.exe.43e04b0.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.2.U7Ncg7oAyC.exe.334e590.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.2.U7Ncg7oAyC.exe.334e590.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 30.2.U7Ncg7oAyC.exe.334e590.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 22.2.dhcpmon.exe.4e04cd0.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.dhcpmon.exe.4e04cd0.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 22.2.dhcpmon.exe.4e04cd0.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 22.2.dhcpmon.exe.4e04cd0.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 34.2.dhcpmon.exe.3f307ce.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 34.2.dhcpmon.exe.3f307ce.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 34.2.dhcpmon.exe.3f307ce.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 34.2.dhcpmon.exe.2f49658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 34.2.dhcpmon.exe.2f49658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 34.2.dhcpmon.exe.2f49658.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 34.2.dhcpmon.exe.2f4e6b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 34.2.dhcpmon.exe.2f4e6b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 34.2.dhcpmon.exe.2f4e6b8.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.U7Ncg7oAyC.exe.4ab9e90.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.U7Ncg7oAyC.exe.4ab9e90.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.U7Ncg7oAyC.exe.4ab9e90.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.2.U7Ncg7oAyC.exe.43307ce.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.2.U7Ncg7oAyC.exe.43307ce.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 30.2.U7Ncg7oAyC.exe.43307ce.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.52c0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.U7Ncg7oAyC.exe.52c0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.U7Ncg7oAyC.exe.52c0000.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 34.2.dhcpmon.exe.3f3b041.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 34.2.dhcpmon.exe.3f3b041.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 34.2.dhcpmon.exe.3f3b041.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 30.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 30.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 30.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.2aa4ef0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.U7Ncg7oAyC.exe.2aa4ef0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.U7Ncg7oAyC.exe.2aa4ef0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.5160000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.U7Ncg7oAyC.exe.5160000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.U7Ncg7oAyC.exe.5160000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.2.U7Ncg7oAyC.exe.433560b.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.2.U7Ncg7oAyC.exe.433560b.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 30.2.U7Ncg7oAyC.exe.433560b.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 30.2.U7Ncg7oAyC.exe.433560b.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.2.U7Ncg7oAyC.exe.433b041.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.2.U7Ncg7oAyC.exe.433b041.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 30.2.U7Ncg7oAyC.exe.433b041.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 34.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 34.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 34.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 34.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 30.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 30.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.2.dhcpmon.exe.4e04cd0.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.dhcpmon.exe.4e04cd0.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 22.2.dhcpmon.exe.4e04cd0.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 22.2.dhcpmon.exe.4e04cd0.11.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 24.2.dhcpmon.exe.43e04b0.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.dhcpmon.exe.43e04b0.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 24.2.dhcpmon.exe.43e04b0.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 24.2.dhcpmon.exe.43e04b0.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 24.2.dhcpmon.exe.4414cd0.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.dhcpmon.exe.4414cd0.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 24.2.dhcpmon.exe.4414cd0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 24.2.dhcpmon.exe.4414cd0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 30.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 30.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.3aab041.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.U7Ncg7oAyC.exe.3aab041.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.U7Ncg7oAyC.exe.3aab041.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.5140000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.U7Ncg7oAyC.exe.5140000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.U7Ncg7oAyC.exe.5140000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 34.2.dhcpmon.exe.3f3b041.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 34.2.dhcpmon.exe.3f3b041.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 34.2.dhcpmon.exe.3f3b041.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 19.2.U7Ncg7oAyC.exe.44104b0.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.U7Ncg7oAyC.exe.44104b0.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 19.2.U7Ncg7oAyC.exe.44104b0.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 19.2.U7Ncg7oAyC.exe.44104b0.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 34.2.dhcpmon.exe.2f49658.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 34.2.dhcpmon.exe.2f49658.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 34.2.dhcpmon.exe.2f49658.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 34.2.dhcpmon.exe.3f307ce.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 34.2.dhcpmon.exe.3f307ce.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 34.2.dhcpmon.exe.3f307ce.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 34.2.dhcpmon.exe.3f307ce.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.52c0000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.U7Ncg7oAyC.exe.52c0000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.U7Ncg7oAyC.exe.52c0000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 19.2.U7Ncg7oAyC.exe.43d9e90.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.U7Ncg7oAyC.exe.43d9e90.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 19.2.U7Ncg7oAyC.exe.43d9e90.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.3aa560b.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.U7Ncg7oAyC.exe.3aa560b.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.U7Ncg7oAyC.exe.3aa560b.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.2.U7Ncg7oAyC.exe.3aa560b.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.2.U7Ncg7oAyC.exe.43307ce.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.2.U7Ncg7oAyC.exe.43307ce.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 30.2.U7Ncg7oAyC.exe.43307ce.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 30.2.U7Ncg7oAyC.exe.43307ce.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 34.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 34.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 34.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 34.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.2.dhcpmon.exe.4dd04b0.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.dhcpmon.exe.4dd04b0.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 22.2.dhcpmon.exe.4dd04b0.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000000.298686733.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000000.298686733.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000022.00000000.386853119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000022.00000000.386853119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000022.00000000.389457782.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000022.00000000.389457782.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000027.00000002.453407372.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000000.301869693.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000000.301869693.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000000.379537717.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001E.00000000.379537717.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000000.300964814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000000.300964814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000022.00000002.429959186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000022.00000002.429959186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000022.00000002.432551676.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.520939639.0000000005160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.520939639.0000000005160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000006.00000002.520939639.0000000005160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000027.00000000.422202899.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000027.00000000.422202899.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000027.00000002.450934240.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000027.00000002.450934240.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000022.00000002.432713600.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000027.00000000.420827923.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000027.00000000.420827923.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000027.00000000.419127267.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000027.00000000.419127267.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.520899025.0000000005140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.520899025.0000000005140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000006.00000002.520899025.0000000005140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000006.00000000.299335853.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000000.299335853.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000002.411971893.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001E.00000002.411971893.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000000.376862241.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001E.00000000.376862241.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000022.00000000.394464414.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000022.00000000.394464414.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000000.378843242.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001E.00000000.378843242.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000018.00000002.434654746.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000018.00000002.434654746.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.521004165.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.521004165.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000006.00000002.521004165.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000027.00000000.423439487.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000027.00000000.423439487.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.513680149.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.513680149.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.409136026.00000000043D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000013.00000002.409136026.00000000043D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000000.373615736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001E.00000000.373615736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000002.419521578.0000000004D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000016.00000002.419521578.0000000004D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000022.00000000.393280850.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000022.00000000.393280850.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000027.00000002.453640867.0000000004069000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.310994827.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.310994827.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 6284, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 6284, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 6752, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 6752, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 2860, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 2860, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 5308, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 5308, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 5256, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 5256, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 6568, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: U7Ncg7oAyC.exe PID: 6568, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 640, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 640, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D720E80_2_02D720E8
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D730400_2_02D73040
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D704700_2_02D70470
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D7B5580_2_02D7B558
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D70FE80_2_02D70FE8
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D753400_2_02D75340
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D753300_2_02D75330
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D751380_2_02D75138
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D751280_2_02D75128
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D757380_2_02D75738
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D755580_2_02D75558
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D755680_2_02D75568
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D74A900_2_02D74A90
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D74A810_2_02D74A81
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D71BF80_2_02D71BF8
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D73ED00_2_02D73ED0
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D73EC10_2_02D73EC1
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D70F3F0_2_02D70F3F
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D72F390_2_02D72F39
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_054D97700_2_054D9770
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_054D00400_2_054D0040
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_054D00060_2_054D0006
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_09C900400_2_09C90040
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_09C9003E0_2_09C9003E
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 6_2_0283E4806_2_0283E480
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 6_2_0283E4716_2_0283E471
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 6_2_0283BBD46_2_0283BBD4
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 6_2_062A03F06_2_062A03F0
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D5047019_2_04D50470
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D5B55819_2_04D5B558
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D520E819_2_04D520E8
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D5304019_2_04D53040
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D50FE819_2_04D50FE8
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D5555819_2_04D55558
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D5556819_2_04D55568
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D5573819_2_04D55738
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D5513819_2_04D55138
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D5512819_2_04D55128
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D5534019_2_04D55340
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D5533019_2_04D55330
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D53ED019_2_04D53ED0
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D53EC119_2_04D53EC1
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D50F3F19_2_04D50F3F
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D52F3919_2_04D52F39
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D54A9019_2_04D54A90
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D54A8119_2_04D54A81
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D51BF819_2_04D51BF8
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_07E0C08019_2_07E0C080
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_07E0004019_2_07E00040
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_07E0BC5819_2_07E0BC58
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_07E0562019_2_07E05620
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_07E0561F19_2_07E0561F
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_07E0C07F19_2_07E0C07F
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_07E0BC4919_2_07E0BC49
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_0929003F19_2_0929003F
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_0929004019_2_09290040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A304022_2_015A3040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A20F822_2_015A20F8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015AB55822_2_015AB558
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A048022_2_015A0480
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A0FE822_2_015A0FE8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A513822_2_015A5138
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A512822_2_015A5128
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A301822_2_015A3018
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A20E822_2_015A20E8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A534022_2_015A5340
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A533022_2_015A5330
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A555822_2_015A5558
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A556822_2_015A5568
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A047022_2_015A0470
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A574822_2_015A5748
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A573822_2_015A5738
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A1BF822_2_015A1BF8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A4A9022_2_015A4A90
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A4A8122_2_015A4A81
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A4DA222_2_015A4DA2
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A1C0822_2_015A1C08
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A0F3F22_2_015A0F3F
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A2FEC22_2_015A2FEC
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A3ED022_2_015A3ED0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A3EC222_2_015A3EC2
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_0571004022_2_05710040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_0571000722_2_05710007
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_09B4003E22_2_09B4003E
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_09B4004022_2_09B40040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0266304024_2_02663040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_026620E824_2_026620E8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0266047024_2_02660470
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0266B55824_2_0266B558
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_02660FE824_2_02660FE8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0266534024_2_02665340
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0266533024_2_02665330
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0266301724_2_02663017
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0266512824_2_02665128
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0266513824_2_02665138
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0266573824_2_02665738
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0266556824_2_02665568
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0266555824_2_02665558
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_02664A8124_2_02664A81
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_02664A9024_2_02664A90
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_02661BF824_2_02661BF8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_02663EC124_2_02663EC1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_02663ED024_2_02663ED0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_02660F3F24_2_02660F3F
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_02662FEB24_2_02662FEB
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_04E149F424_2_04E149F4
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_04E16A2124_2_04E16A21
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_04E16A3024_2_04E16A30
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_04F3004024_2_04F30040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_04F3000624_2_04F30006
        Source: U7Ncg7oAyC.exeBinary or memory string: OriginalFilename vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000000.00000002.309699383.0000000004715000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000000.00000002.311185791.0000000004F10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000000.00000002.305800240.0000000000C24000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameContractArgumentValidatorAttrib.exe2 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000000.00000000.246905121.0000000000B82000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameContractArgumentValidatorAttrib.exe2 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000000.00000003.269472442.0000000009BA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameContractArgumentValidatorAttrib.exe2 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000000.00000002.313988013.00000000098D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFort.dll" vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exeBinary or memory string: OriginalFilename vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000006.00000000.298268399.0000000000522000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameContractArgumentValidatorAttrib.exe2 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000006.00000002.517591077.0000000002A51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000006.00000002.517591077.0000000002A51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exeBinary or memory string: OriginalFilename vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000013.00000002.382607982.00000000004C4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameContractArgumentValidatorAttrib.exe2 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000013.00000000.317398335.0000000000422000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameContractArgumentValidatorAttrib.exe2 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000013.00000002.393603690.0000000004035000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 00000013.00000002.411649755.0000000004830000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 0000001E.00000000.374097639.0000000000D12000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameContractArgumentValidatorAttrib.exe2 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exe, 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs U7Ncg7oAyC.exe
        Source: U7Ncg7oAyC.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: LYKZypsugb.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: dhcpmon.exe.6.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: U7Ncg7oAyC.exeVirustotal: Detection: 43%
        Source: U7Ncg7oAyC.exeReversingLabs: Detection: 63%
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeFile read: C:\Users\user\Desktop\U7Ncg7oAyC.exeJump to behavior
        Source: U7Ncg7oAyC.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\U7Ncg7oAyC.exe "C:\Users\user\Desktop\U7Ncg7oAyC.exe"
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmp43AF.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Users\user\Desktop\U7Ncg7oAyC.exe C:\Users\user\Desktop\U7Ncg7oAyC.exe
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp6DAD.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp7772.tmp
        Source: unknownProcess created: C:\Users\user\Desktop\U7Ncg7oAyC.exe C:\Users\user\Desktop\U7Ncg7oAyC.exe 0
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF4.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Users\user\Desktop\U7Ncg7oAyC.exe C:\Users\user\Desktop\U7Ncg7oAyC.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmpE07C.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmpFF8.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exeJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmp43AF.tmpJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Users\user\Desktop\U7Ncg7oAyC.exe C:\Users\user\Desktop\U7Ncg7oAyC.exeJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp6DAD.tmpJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp7772.tmpJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF4.tmp
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Users\user\Desktop\U7Ncg7oAyC.exe C:\Users\user\Desktop\U7Ncg7oAyC.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmpE07C.tmp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmpFF8.tmp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeFile created: C:\Users\user\AppData\Roaming\LYKZypsugb.exeJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeFile created: C:\Users\user\AppData\Local\Temp\tmp43AF.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@42/24@4/2
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{b3a6f9ad-fdc4-4025-8d68-cc0f37771046}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4948:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6520:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1328:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6508:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3572:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6480:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6672:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6468:120:WilError_01
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: U7Ncg7oAyC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: U7Ncg7oAyC.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: U7Ncg7oAyC.exe, 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmp, U7Ncg7oAyC.exe, 00000006.00000002.517591077.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, U7Ncg7oAyC.exe, 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, U7Ncg7oAyC.exe, 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000022.00000002.432551676.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000022.00000002.432713600.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeUnpacked PE file: 0.2.U7Ncg7oAyC.exe.b80000.0.unpack
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeUnpacked PE file: 19.2.U7Ncg7oAyC.exe.420000.0.unpack
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeUnpacked PE file: 22.2.dhcpmon.exe.cf0000.0.unpack
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeUnpacked PE file: 24.2.dhcpmon.exe.3b0000.0.unpack
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeUnpacked PE file: 0.2.U7Ncg7oAyC.exe.b80000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeUnpacked PE file: 19.2.U7Ncg7oAyC.exe.420000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeUnpacked PE file: 22.2.dhcpmon.exe.cf0000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeUnpacked PE file: 24.2.dhcpmon.exe.3b0000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_00B82299 push ebx; ret 0_2_00B822AB
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D761E8 push esp; iretd 0_2_02D761E9
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_02D76AE1 push dword ptr [ebx]; iretd 0_2_02D76AEC
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_054D3DFB push esi; ret 0_2_054D3DFC
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 0_2_09C93DBD pushfd ; ret 0_2_09C93DBE
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 6_2_00522299 push ebx; ret 6_2_005222AB
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_00422299 push ebx; ret 19_2_004222AB
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D561E8 push esp; iretd 19_2_04D561E9
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_04D56AE1 push dword ptr [ebx]; iretd 19_2_04D56AEC
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeCode function: 19_2_09293DBD pushfd ; ret 19_2_09293DBE
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_00CF2299 push ebx; ret 22_2_00CF22AB
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A61E8 push esp; iretd 22_2_015A61E9
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_015A6AE1 push dword ptr [ebx]; iretd 22_2_015A6AEC
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_05713DFB push esi; ret 22_2_05713DFC
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 22_2_09B43DBD pushfd ; ret 22_2_09B43DBE
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_003B2299 push ebx; ret 24_2_003B22AB
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_026661E8 push esp; iretd 24_2_026661E9
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_02666AE1 push dword ptr [ebx]; iretd 24_2_02666AEC
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_04F33DFB push esi; ret 24_2_04F33DFC
        Source: initial sampleStatic PE information: section name: .text entropy: 7.75508986641
        Source: initial sampleStatic PE information: section name: .text entropy: 7.75508986641
        Source: initial sampleStatic PE information: section name: .text entropy: 7.75508986641
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeFile created: C:\Users\user\AppData\Roaming\LYKZypsugb.exeJump to dropped file
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmp43AF.tmp

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeFile opened: C:\Users\user\Desktop\U7Ncg7oAyC.exe:Zone.Identifier read attributes | deleteJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: 00000013.00000002.384938469.0000000002831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.427276046.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.306915424.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.410739421.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 6284, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 2860, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5308, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5256, type: MEMORYSTR
        Source: U7Ncg7oAyC.exe, 00000000.00000002.306915424.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, U7Ncg7oAyC.exe, 00000013.00000002.384938469.0000000002831000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000016.00000002.410739421.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000018.00000002.427276046.0000000002801000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
        Source: U7Ncg7oAyC.exe, 00000000.00000002.306915424.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, U7Ncg7oAyC.exe, 00000013.00000002.384938469.0000000002831000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000016.00000002.410739421.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000018.00000002.427276046.0000000002801000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exe TID: 6288Thread sleep time: -45733s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exe TID: 6316Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6736Thread sleep time: -10145709240540247s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exe TID: 5316Thread sleep time: -18446744073709540s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exe TID: 6348Thread sleep time: -45733s >= -30000s
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exe TID: 5544Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6628Thread sleep time: -45733s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1036Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5744Thread sleep time: -45733s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6120Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6952Thread sleep time: -15679732462653109s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6732Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6488Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2320Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exe TID: 468Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5352Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7257Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1385Jump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeWindow / User API: threadDelayed 5589Jump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeWindow / User API: threadDelayed 3709Jump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeWindow / User API: foregroundWindowGot 676Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3341
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5015
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeThread delayed: delay time: 45733Jump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeThread delayed: delay time: 45733
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 45733
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 45733
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: dhcpmon.exe, 00000018.00000002.427276046.0000000002801000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 00000018.00000002.427276046.0000000002801000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
        Source: dhcpmon.exe, 00000018.00000002.427276046.0000000002801000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
        Source: dhcpmon.exe, 00000018.00000002.427276046.0000000002801000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeMemory written: C:\Users\user\Desktop\U7Ncg7oAyC.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeMemory written: C:\Users\user\Desktop\U7Ncg7oAyC.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exeJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exeJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmp43AF.tmpJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Users\user\Desktop\U7Ncg7oAyC.exe C:\Users\user\Desktop\U7Ncg7oAyC.exeJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp6DAD.tmpJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp7772.tmpJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF4.tmp
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeProcess created: C:\Users\user\Desktop\U7Ncg7oAyC.exe C:\Users\user\Desktop\U7Ncg7oAyC.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmpE07C.tmp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmpFF8.tmp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: U7Ncg7oAyC.exe, 00000006.00000002.519112571.0000000002E77000.00000004.00000800.00020000.00000000.sdmp, U7Ncg7oAyC.exe, 00000006.00000002.517682575.0000000002AC3000.00000004.00000800.00020000.00000000.sdmp, U7Ncg7oAyC.exe, 00000006.00000002.517867375.0000000002B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: U7Ncg7oAyC.exe, 00000006.00000002.521213475.000000000605C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program ManagerlT
        Source: U7Ncg7oAyC.exe, 00000006.00000002.521628763.0000000006D7C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerlt
        Source: U7Ncg7oAyC.exe, 00000006.00000002.517929378.0000000002B6D000.00000004.00000800.00020000.00000000.sdmp, U7Ncg7oAyC.exe, 00000006.00000002.518844326.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, U7Ncg7oAyC.exe, 00000006.00000002.519038098.0000000002E53000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerL@
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Users\user\Desktop\U7Ncg7oAyC.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Users\user\Desktop\U7Ncg7oAyC.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Users\user\Desktop\U7Ncg7oAyC.exe VolumeInformation
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Users\user\Desktop\U7Ncg7oAyC.exe VolumeInformation
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\U7Ncg7oAyC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 24.2.dhcpmon.exe.43a9e90.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.433b041.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f3560b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.44104b0.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4dd04b0.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aab041.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.4414cd0.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.52c4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4d99e90.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.43e04b0.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4e04cd0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4ab9e90.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.52c0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f3b041.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.433560b.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.433b041.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4e04cd0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.43e04b0.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.4414cd0.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aab041.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f3b041.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.44104b0.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f307ce.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.52c0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.43d9e90.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aa560b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.43307ce.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4dd04b0.12.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000006.00000000.298686733.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.386853119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.389457782.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000002.453407372.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000000.301869693.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.379537717.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000000.300964814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.429959186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.432551676.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.422202899.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000002.450934240.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.432713600.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.420827923.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.419127267.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000000.299335853.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.411971893.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.376862241.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.517591077.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.394464414.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.378843242.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.434654746.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.521004165.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.423439487.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.513680149.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.409136026.00000000043D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.373615736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.419521578.0000000004D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.393280850.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000002.453640867.0000000004069000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.310994827.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 6284, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 6752, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 2860, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5308, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5256, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 6568, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 640, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: U7Ncg7oAyC.exe, 00000000.00000002.310994827.0000000004AB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: U7Ncg7oAyC.exe, 00000006.00000000.298686733.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: U7Ncg7oAyC.exe, 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: U7Ncg7oAyC.exe, 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: U7Ncg7oAyC.exe, 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
        Source: U7Ncg7oAyC.exe, 00000006.00000002.517591077.0000000002A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: U7Ncg7oAyC.exe, 00000006.00000002.517591077.0000000002A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: U7Ncg7oAyC.exe, 00000006.00000002.517591077.0000000002A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
        Source: U7Ncg7oAyC.exe, 00000013.00000002.409136026.00000000043D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000016.00000002.419521578.0000000004D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000018.00000002.434654746.00000000043A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: U7Ncg7oAyC.exe, 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: U7Ncg7oAyC.exe, 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: U7Ncg7oAyC.exe, 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
        Source: U7Ncg7oAyC.exe, 0000001E.00000000.379537717.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: U7Ncg7oAyC.exe, 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: U7Ncg7oAyC.exe, 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: U7Ncg7oAyC.exe, 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
        Source: dhcpmon.exe, 00000022.00000000.386853119.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000022.00000002.432551676.0000000002EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000022.00000002.432551676.0000000002EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000022.00000002.432551676.0000000002EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
        Source: dhcpmon.exe, 00000022.00000002.432713600.0000000003EE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000022.00000002.432713600.0000000003EE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000022.00000002.432713600.0000000003EE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
        Source: Yara matchFile source: 24.2.dhcpmon.exe.43a9e90.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.433b041.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f3560b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.44104b0.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4dd04b0.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aab041.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.4414cd0.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.52c4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4d99e90.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.43e04b0.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4e04cd0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.4444cd0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4ab9e90.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.52c0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f3b041.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.0.U7Ncg7oAyC.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.433560b.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aa07ce.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.433b041.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4b24cd0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.U7Ncg7oAyC.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4e04cd0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.43e04b0.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.dhcpmon.exe.4414cd0.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.U7Ncg7oAyC.exe.4af04b0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aab041.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f3b041.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.44104b0.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.2.dhcpmon.exe.3f307ce.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.52c0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.U7Ncg7oAyC.exe.43d9e90.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.U7Ncg7oAyC.exe.3aa560b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.U7Ncg7oAyC.exe.43307ce.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 34.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.dhcpmon.exe.4dd04b0.12.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000006.00000000.298686733.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.386853119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.389457782.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000002.453407372.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000000.301869693.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.379537717.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000000.300964814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.429959186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.432551676.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.422202899.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000002.450934240.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.432713600.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.420827923.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.419127267.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000000.299335853.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.411971893.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.376862241.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.517591077.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.394464414.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.378843242.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.434654746.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.521004165.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000000.423439487.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.513680149.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.409136026.00000000043D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.373615736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.419521578.0000000004D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000000.393280850.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000027.00000002.453640867.0000000004069000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.310994827.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 6284, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 6752, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 2860, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5308, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5256, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: U7Ncg7oAyC.exe PID: 6568, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 640, type: MEMORYSTR
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Scheduled Task/Job
        1
        Scheduled Task/Job
        112
        Process Injection
        2
        Masquerading
        11
        Input Capture
        1
        Query Registry
        Remote Services11
        Input Capture
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Scheduled Task/Job
        11
        Disable or Modify Tools
        LSASS Memory21
        Security Software Discovery
        Remote Desktop Protocol11
        Archive Collected Data
        Exfiltration Over Bluetooth1
        Non-Standard Port
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
        Virtualization/Sandbox Evasion
        Security Account Manager2
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Remote Access Software
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
        Process Injection
        NTDS21
        Virtualization/Sandbox Evasion
        Distributed Component Object ModelInput CaptureScheduled Transfer1
        Non-Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Deobfuscate/Decode Files or Information
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingData Transfer Size Limits1
        Application Layer Protocol
        Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common1
        Hidden Files and Directories
        Cached Domain Credentials1
        Remote System Discovery
        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items3
        Obfuscated Files or Information
        DCSync1
        File and Directory Discovery
        Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job33
        Software Packing
        Proc Filesystem12
        System Information Discovery
        Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 623790 Sample: U7Ncg7oAyC.exe Startdate: 10/05/2022 Architecture: WINDOWS Score: 100 77 Malicious sample detected (through community Yara rule) 2->77 79 Multi AV Scanner detection for dropped file 2->79 81 Multi AV Scanner detection for submitted file 2->81 83 12 other signatures 2->83 8 U7Ncg7oAyC.exe 7 2->8         started        12 U7Ncg7oAyC.exe 2->12         started        14 dhcpmon.exe 2->14         started        16 dhcpmon.exe 2->16         started        process3 file4 65 C:\Users\user\AppData\...\LYKZypsugb.exe, PE32 8->65 dropped 67 C:\Users\...\LYKZypsugb.exe:Zone.Identifier, ASCII 8->67 dropped 69 C:\Users\user\AppData\Local\...\tmp43AF.tmp, XML 8->69 dropped 71 C:\Users\user\AppData\...\U7Ncg7oAyC.exe.log, ASCII 8->71 dropped 89 Detected unpacking (changes PE section rights) 8->89 91 Detected unpacking (overwrites its own PE header) 8->91 93 Uses schtasks.exe or at.exe to add and modify task schedules 8->93 18 U7Ncg7oAyC.exe 1 12 8->18         started        23 powershell.exe 25 8->23         started        25 schtasks.exe 1 8->25         started        95 Adds a directory exclusion to Windows Defender 12->95 97 Injects a PE file into a foreign processes 12->97 27 powershell.exe 12->27         started        29 schtasks.exe 12->29         started        31 U7Ncg7oAyC.exe 12->31         started        33 powershell.exe 14->33         started        35 schtasks.exe 14->35         started        37 dhcpmon.exe 14->37         started        signatures5 process6 dnsIp7 73 185.19.85.160, 49778, 49779, 49781 DATAWIRE-ASCH Switzerland 18->73 75 fastspeed.ddnsfree.com 102.89.42.162, 49770, 49782, 54761 VCG-ASNG Nigeria 18->75 59 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->59 dropped 61 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 18->61 dropped 63 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->63 dropped 85 Protects its processes via BreakOnTermination flag 18->85 87 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->87 39 schtasks.exe 18->39         started        41 schtasks.exe 18->41         started        43 conhost.exe 23->43         started        45 conhost.exe 25->45         started        47 conhost.exe 27->47         started        49 conhost.exe 29->49         started        51 conhost.exe 33->51         started        53 conhost.exe 35->53         started        file8 signatures9 process10 process11 55 conhost.exe 39->55         started        57 conhost.exe 41->57         started       

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        U7Ncg7oAyC.exe43%VirustotalBrowse
        U7Ncg7oAyC.exe63%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        U7Ncg7oAyC.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\LYKZypsugb.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe63%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        C:\Users\user\AppData\Roaming\LYKZypsugb.exe63%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        SourceDetectionScannerLabelLinkDownload
        24.2.dhcpmon.exe.3b0000.0.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
        30.0.U7Ncg7oAyC.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        34.0.dhcpmon.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        6.0.U7Ncg7oAyC.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        34.0.dhcpmon.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        6.0.U7Ncg7oAyC.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        6.0.U7Ncg7oAyC.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        30.0.U7Ncg7oAyC.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        6.0.U7Ncg7oAyC.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        34.0.dhcpmon.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        19.2.U7Ncg7oAyC.exe.420000.0.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
        30.0.U7Ncg7oAyC.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        34.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        30.0.U7Ncg7oAyC.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        6.0.U7Ncg7oAyC.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        6.2.U7Ncg7oAyC.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        0.2.U7Ncg7oAyC.exe.b80000.0.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
        34.0.dhcpmon.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        30.0.U7Ncg7oAyC.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        22.2.dhcpmon.exe.cf0000.0.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
        30.2.U7Ncg7oAyC.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        34.0.dhcpmon.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        6.2.U7Ncg7oAyC.exe.52c0000.10.unpack100%AviraTR/NanoCore.fadteDownload File
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        fastspeed.ddnsfree.com
        102.89.42.162
        truefalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.com/designersGU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designers/?U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.tiro.comU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.goodfont.co.krU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/cTheU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-user.htmlU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/DPleaseU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8U7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fonts.comU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.sandoll.co.krU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deDPleaseU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameU7Ncg7oAyC.exe, 00000000.00000002.306915424.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, U7Ncg7oAyC.exe, 00000013.00000002.384938469.0000000002831000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000016.00000002.410739421.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000018.00000002.427276046.0000000002801000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sakkal.comU7Ncg7oAyC.exe, 00000000.00000002.313111190.0000000009482000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                102.89.42.162
                                fastspeed.ddnsfree.comNigeria
                                29465VCG-ASNGfalse
                                185.19.85.160
                                unknownSwitzerland
                                48971DATAWIRE-ASCHtrue
                                Joe Sandbox Version:34.0.0 Boulder Opal
                                Analysis ID:623790
                                Start date and time: 10/05/202220:24:162022-05-10 20:24:16 +02:00
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 14m 49s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Sample file name:U7Ncg7oAyC.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:46
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@42/24@4/2
                                EGA Information:
                                • Successful, ratio: 100%
                                HDC Information:
                                • Successful, ratio: 1.9% (good quality ratio 1.4%)
                                • Quality average: 45.6%
                                • Quality standard deviation: 35.6%
                                HCA Information:
                                • Successful, ratio: 84%
                                • Number of executed functions: 145
                                • Number of non-executed functions: 18
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Adjust boot time
                                • Enable AMSI
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, store-images.s-microsoft.com, login.live.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report creation exceeded maximum time and may have missing behavior and disassembly information.
                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                20:25:34API Interceptor683x Sleep call for process: U7Ncg7oAyC.exe modified
                                20:25:47API Interceptor117x Sleep call for process: powershell.exe modified
                                20:25:58Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\U7Ncg7oAyC.exe" s>$(Arg0)
                                20:26:00AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                20:26:02Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                20:26:11API Interceptor4x Sleep call for process: dhcpmon.exe modified
                                No context
                                No context
                                No context
                                No context
                                No context
                                Process:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):664064
                                Entropy (8bit):7.74828321522851
                                Encrypted:false
                                SSDEEP:12288:QqGhvUmBJRrmxQiRcA6qcDwnwSbKKzXHw1hwtfu4AILNTHtrlHSMOl40s0hAD0iO:pGdPBJRCGinMSmgXeQ33LL9SMOl
                                MD5:1D2CA2D522F8F4E99609CF7E88E673B4
                                SHA1:7754EADE48451776AB6109A0C584573780A4F531
                                SHA-256:26E6FE6C78632392C446E53EB0779EC99E0864D09265B9DDA557763629EF3396
                                SHA-512:427A23DFE919BC0EA067D8641829DD767DF8E68A8639E17583F3E52168E69F6CBE434B6155F807418036CEF81B62FD4F605A7EA648474B3FAA7F5C46C0E6E615
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 63%
                                Reputation:unknown
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....xb..............0..............7... ...@....@.. ....................................@..................................7..W....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`....... ..............@..B.................7......H...........t_...........p..pg..........................................2......d.m......0......nx..zm.f...m3 ....3..!..TS......7..(^.XE..d..SM..z.Rl.....\.8,....k..<...)<..:/..vA..U}..Wvf.F..Y.#.....|..H..7..-..;OM..`&..vQ..!k.Jn.l..?A..HUk#....6.J&.w....}...."h.,..A?=.k...k..ej...F.6.X2YT&.8e. W&..x.u.........|;.h......p.]..D.s$~r8).......f..U#..f)...n.-..=..3.... #:M[nK{.........8.[.c!).7Y(Y.+..B...]..o....|>..e....d..-.d..A..:.*..&..j......O.T.9.sQ..7..#{
                                Process:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:unknown
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:modified
                                Size (bytes):1308
                                Entropy (8bit):5.345811588615766
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                MD5:2E016B886BDB8389D2DD0867BE55F87B
                                SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                Malicious:true
                                Reputation:unknown
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1308
                                Entropy (8bit):5.345811588615766
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                MD5:2E016B886BDB8389D2DD0867BE55F87B
                                SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                Malicious:false
                                Reputation:unknown
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):22088
                                Entropy (8bit):5.603576278487026
                                Encrypted:false
                                SSDEEP:384:/tCDSq0G3IwPko0Rb1RwSBKnkjultIU4ptQCvHg3hIn0ML+2fmAV7l/DvyZQvnIS:sIAkokM4KkCltHQKA66/Kqp0+x
                                MD5:B48A3CB56D940D40899C82CB18349019
                                SHA1:A81F5B80148B290F7B115B1862A6BF492754472B
                                SHA-256:456907D8FEC547A994094963214D6433096460E716734BC3F0565D0017A39CD8
                                SHA-512:3DF1CE0167928C518BC5E7957944FEA3D79021F7B2A672AF5E16AE8622E003D99AD78591471C3FBEFC7121075ABA22948A13B2C91C1DB486FEC1B3AF6129AB07
                                Malicious:false
                                Reputation:unknown
                                Preview:@...e...........K.......{...........n...'.[..........@..........H...............<@.^.L."My...:<..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Reputation:unknown
                                Preview:1
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Reputation:unknown
                                Preview:1
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Reputation:unknown
                                Preview:1
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Reputation:unknown
                                Preview:1
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Reputation:unknown
                                Preview:1
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Reputation:unknown
                                Preview:1
                                Process:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                File Type:XML 1.0 document, ASCII text
                                Category:dropped
                                Size (bytes):1597
                                Entropy (8bit):5.144122461061698
                                Encrypted:false
                                SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtanxvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTMv
                                MD5:9EFD51689C727F20C031623471DE2F80
                                SHA1:D482AE77FF2C56200AFF26D1F60F154EA3284424
                                SHA-256:48DB737457328E54039E4D5EAFC9A5138E44BD8517AFE7CCCBCC897DBE14883D
                                SHA-512:6FE4406EB3AEA4BC6526F41679C148EC6FEF5D94CE336480CC697E0FF331C33C3706751B3798B390AAFC764F4D2EAAA487C8C149EDD26A1F05B6D67B3EACC2E7
                                Malicious:true
                                Reputation:unknown
                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                Process:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1300
                                Entropy (8bit):5.1120026128474345
                                Encrypted:false
                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Yaxtn:cbk4oL600QydbQxIYODOLedq3Wj
                                MD5:2B43925FC06B18EE3393BA0ADD40BAAF
                                SHA1:CAAA2EC5919286948F8261749881EC16F002F7AE
                                SHA-256:BC1F1A6129175A30B5AAB1BBA669B079FC6EEEA63932408B45360D7D17954CAD
                                SHA-512:A219269E021E58E60B8ADDF2944D4704DEB13E6C83DAB93559982673D2DF7279B6DDE6C6EB2528DF5B893144679DD16132B0B366C327A7E7D34EC3163084B8B5
                                Malicious:false
                                Reputation:unknown
                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                Process:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:modified
                                Size (bytes):1310
                                Entropy (8bit):5.109425792877704
                                Encrypted:false
                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                Malicious:false
                                Reputation:unknown
                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                Process:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                File Type:XML 1.0 document, ASCII text
                                Category:dropped
                                Size (bytes):1597
                                Entropy (8bit):5.144122461061698
                                Encrypted:false
                                SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtanxvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTMv
                                MD5:9EFD51689C727F20C031623471DE2F80
                                SHA1:D482AE77FF2C56200AFF26D1F60F154EA3284424
                                SHA-256:48DB737457328E54039E4D5EAFC9A5138E44BD8517AFE7CCCBCC897DBE14883D
                                SHA-512:6FE4406EB3AEA4BC6526F41679C148EC6FEF5D94CE336480CC697E0FF331C33C3706751B3798B390AAFC764F4D2EAAA487C8C149EDD26A1F05B6D67B3EACC2E7
                                Malicious:false
                                Reputation:unknown
                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                File Type:XML 1.0 document, ASCII text
                                Category:dropped
                                Size (bytes):1597
                                Entropy (8bit):5.144122461061698
                                Encrypted:false
                                SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtanxvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTMv
                                MD5:9EFD51689C727F20C031623471DE2F80
                                SHA1:D482AE77FF2C56200AFF26D1F60F154EA3284424
                                SHA-256:48DB737457328E54039E4D5EAFC9A5138E44BD8517AFE7CCCBCC897DBE14883D
                                SHA-512:6FE4406EB3AEA4BC6526F41679C148EC6FEF5D94CE336480CC697E0FF331C33C3706751B3798B390AAFC764F4D2EAAA487C8C149EDD26A1F05B6D67B3EACC2E7
                                Malicious:false
                                Reputation:unknown
                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                File Type:XML 1.0 document, ASCII text
                                Category:dropped
                                Size (bytes):1597
                                Entropy (8bit):5.144122461061698
                                Encrypted:false
                                SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtanxvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTMv
                                MD5:9EFD51689C727F20C031623471DE2F80
                                SHA1:D482AE77FF2C56200AFF26D1F60F154EA3284424
                                SHA-256:48DB737457328E54039E4D5EAFC9A5138E44BD8517AFE7CCCBCC897DBE14883D
                                SHA-512:6FE4406EB3AEA4BC6526F41679C148EC6FEF5D94CE336480CC697E0FF331C33C3706751B3798B390AAFC764F4D2EAAA487C8C149EDD26A1F05B6D67B3EACC2E7
                                Malicious:false
                                Reputation:unknown
                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                Process:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                File Type:Non-ISO extended-ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):8
                                Entropy (8bit):3.0
                                Encrypted:false
                                SSDEEP:3:0SF:0o
                                MD5:E1A65AC335BAFC6F6B29C3045CC80746
                                SHA1:910EDE448F0375017B38504D04238B88ECE7B665
                                SHA-256:39328DADE32C9C89241351CFF0BD948E101D8AACDD5DFB46AEC0B026A80138D3
                                SHA-512:96FE761F46A325A48E2564669484741994EFFDE25F65F18F392D8BD4E18C1F6105DF7B7F846F572A524AFFEFF8EB83312B165700B67E2EEC77791F5C9E8F81F0
                                Malicious:true
                                Reputation:unknown
                                Preview:.....2.H
                                Process:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):37
                                Entropy (8bit):4.17257423112624
                                Encrypted:false
                                SSDEEP:3:oNt+WfWwYHKN:oNwvwpN
                                MD5:B9253443357B989E29C7F2ABD211659E
                                SHA1:62C23472EF297E9AD5885DA092E10632FE9A1255
                                SHA-256:9A1CC820F868A1592FB51E9FCFC659212799237AC0D601CDA4D14C2A856B0F94
                                SHA-512:758C0362AD1D81B8C976079C1C1C2EFF65EA2E7966C75ACFB7ADF745F047DF07FDE309E62850E9A9F6499349D387FB48FF08FF97943B2AF8EA31AE26FC08318D
                                Malicious:false
                                Reputation:unknown
                                Preview:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                Process:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):664064
                                Entropy (8bit):7.74828321522851
                                Encrypted:false
                                SSDEEP:12288:QqGhvUmBJRrmxQiRcA6qcDwnwSbKKzXHw1hwtfu4AILNTHtrlHSMOl40s0hAD0iO:pGdPBJRCGinMSmgXeQ33LL9SMOl
                                MD5:1D2CA2D522F8F4E99609CF7E88E673B4
                                SHA1:7754EADE48451776AB6109A0C584573780A4F531
                                SHA-256:26E6FE6C78632392C446E53EB0779EC99E0864D09265B9DDA557763629EF3396
                                SHA-512:427A23DFE919BC0EA067D8641829DD767DF8E68A8639E17583F3E52168E69F6CBE434B6155F807418036CEF81B62FD4F605A7EA648474B3FAA7F5C46C0E6E615
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 63%
                                Reputation:unknown
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....xb..............0..............7... ...@....@.. ....................................@..................................7..W....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`....... ..............@..B.................7......H...........t_...........p..pg..........................................2......d.m......0......nx..zm.f...m3 ....3..!..TS......7..(^.XE..d..SM..z.Rl.....\.8,....k..<...)<..:/..vA..U}..Wvf.F..Y.#.....|..H..7..-..;OM..`&..vQ..!k.Jn.l..?A..HUk#....6.J&.w....}...."h.,..A?=.k...k..ej...F.6.X2YT&.8e. W&..x.u.........|;.h......p.]..D.s$~r8).......f..U#..f)...n.-..=..3.... #:M[nK{.........8.[.c!).7Y(Y.+..B...]..o....|>..e....d..-.d..A..:.*..&..j......O.T.9.sQ..7..#{
                                Process:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:unknown
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):5789
                                Entropy (8bit):5.414955622850825
                                Encrypted:false
                                SSDEEP:96:BZKjSNnqDo1ZOZpjSNnqDo1ZGEi8jZ2jSNnqDo1ZWhMMGZJ:1
                                MD5:B8023493ACFC7513D0B49AC20F2AB2DC
                                SHA1:9BC3EA79060F4698CC039DCC51BBD1F27CFD337E
                                SHA-256:D7C6D92CC95D6E5BA2C61130C7ED8B40DA8015D47114BCD0FACCFFEAA6368FF2
                                SHA-512:927559E2A182AAB36373159E60E4AD97157AD28FC2A46ED8E2DCBEB73B9A35D71C80C690BC5DA6E4DA4348662C57CD7D0CBF1D884270CFB2A5BA7BEF61E36CB0
                                Malicious:false
                                Reputation:unknown
                                Preview:.**********************..Windows PowerShell transcript start..Start time: 20220510202547..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 116938 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\LYKZypsugb.exe..Process ID: 6456..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220510202547..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\LYKZypsugb.exe..**********************..Windows PowerShell transcript start..Start time: 20220510202940..Username: computer\user..RunAs User: computer\jone
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):5789
                                Entropy (8bit):5.41591529611037
                                Encrypted:false
                                SSDEEP:96:BZ2jSNXqDo1ZyZhjSNXqDo1ZCEi8jZ7jSNXqDo1ZFhMMFZ+:R
                                MD5:C4495982528CE031FA1A15D45CF20ABA
                                SHA1:932D64C3C0B2FB6D311B2574D9D1A3D6B3E3AB0B
                                SHA-256:4BAE03386C9DEE4B2DE0E955E22871D88814AEE8A94189D9C323429C397B51DC
                                SHA-512:E4AFB126DB67E8858BC346BFE550099A8AFB2B3812F8CF8E96B9B8FD907C4655ABF856B39053BB723F9B516FBFAEED8FA71415A0855A607072F3B9117C0DC93D
                                Malicious:false
                                Reputation:unknown
                                Preview:.**********************..Windows PowerShell transcript start..Start time: 20220510202626..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 116938 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\LYKZypsugb.exe..Process ID: 6944..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220510202626..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\LYKZypsugb.exe..**********************..Windows PowerShell transcript start..Start time: 20220510203015..Username: computer\user..RunAs User: computer\jone
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):5789
                                Entropy (8bit):5.417413913822655
                                Encrypted:false
                                SSDEEP:96:BZ6jSNp3qDo1ZaZJjSNp3qDo1ZzEi8jZfjSNp3qDo1ZhhMM8Z/:A
                                MD5:5B233F88C4CC3E2FDC7A7C2A28841E46
                                SHA1:EAEBE12A987BDC0EF1E17349AD12C6578E404F8E
                                SHA-256:46B9CF88587AA3AC70A8BCFE4786B2BEF96982598C4F4A0122FCBBD23E2040A2
                                SHA-512:5E10920CE9093116FE0F1BBDCE4179248D1CC234D05E769558A1A0AA056019DF5EA3F00628D9DEC649C63B446D1F52D110EDA6C68D8C0CE912AC0D3C31AABEC5
                                Malicious:false
                                Reputation:unknown
                                Preview:.**********************..Windows PowerShell transcript start..Start time: 20220510202617..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 116938 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\LYKZypsugb.exe..Process ID: 5684..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220510202617..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\LYKZypsugb.exe..**********************..Windows PowerShell transcript start..Start time: 20220510202852..Username: computer\user..RunAs User: computer\jone
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.74828321522851
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Windows Screen Saver (13104/52) 0.07%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                File name:U7Ncg7oAyC.exe
                                File size:664064
                                MD5:1d2ca2d522f8f4e99609cf7e88e673b4
                                SHA1:7754eade48451776ab6109a0c584573780a4f531
                                SHA256:26e6fe6c78632392c446e53eb0779ec99e0864d09265b9dda557763629ef3396
                                SHA512:427a23dfe919bc0ea067d8641829dd767df8e68a8639e17583f3e52168e69f6cbe434b6155f807418036cef81b62fd4f605a7ea648474b3faa7f5c46c0e6e615
                                SSDEEP:12288:QqGhvUmBJRrmxQiRcA6qcDwnwSbKKzXHw1hwtfu4AILNTHtrlHSMOl40s0hAD0iO:pGdPBJRCGinMSmgXeQ33LL9SMOl
                                TLSH:AFE49D9C765075EFC867CC76CAA82C64EA6064BB430BE207902725EDDE0D99BCF151F2
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....xb..............0..............7... ...@....@.. ....................................@................................
                                Icon Hash:00828e8e8686b000
                                Entrypoint:0x4a37de
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                Time Stamp:0x627883BD [Mon May 9 03:00:13 2022 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:v4.0.30319
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xa37840x57.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xa40000x600.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xa60000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000xa17e40xa1800False0.859081728909data7.75508986641IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rsrc0xa40000x6000x600False0.430989583333data4.19396571799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xa60000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountry
                                RT_VERSION0xa40a00x374data
                                RT_MANIFEST0xa44140x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                DLLImport
                                mscoree.dll_CorExeMain
                                DescriptionData
                                Translation0x0000 0x04b0
                                LegalCopyrightCopyright 2014
                                Assembly Version1.0.0.0
                                InternalNameContractArgumentValidatorAttrib.exe
                                FileVersion1.0.0.0
                                CompanyName
                                LegalTrademarks
                                Comments
                                ProductNameOversikt
                                ProductVersion1.0.0.0
                                FileDescriptionOversikt
                                OriginalFilenameContractArgumentValidatorAttrib.exe
                                TimestampSource PortDest PortSource IPDest IP
                                May 10, 2022 20:26:05.844319105 CEST4976354761192.168.2.4102.89.42.162
                                May 10, 2022 20:26:08.957075119 CEST4976354761192.168.2.4102.89.42.162
                                May 10, 2022 20:26:15.051246881 CEST4976354761192.168.2.4102.89.42.162
                                May 10, 2022 20:26:31.738562107 CEST4976754761192.168.2.4102.89.42.162
                                May 10, 2022 20:26:34.914781094 CEST4976754761192.168.2.4102.89.42.162
                                May 10, 2022 20:26:40.912978888 CEST4976754761192.168.2.4102.89.42.162
                                May 10, 2022 20:26:57.675729990 CEST4977054761192.168.2.4102.89.42.162
                                May 10, 2022 20:27:00.867829084 CEST4977054761192.168.2.4102.89.42.162
                                May 10, 2022 20:27:06.883775949 CEST4977054761192.168.2.4102.89.42.162
                                May 10, 2022 20:27:07.024118900 CEST5476149770102.89.42.162192.168.2.4
                                May 10, 2022 20:27:07.024276972 CEST4977054761192.168.2.4102.89.42.162
                                May 10, 2022 20:27:09.033850908 CEST4977054761192.168.2.4102.89.42.162
                                May 10, 2022 20:27:13.099729061 CEST4977854761192.168.2.4185.19.85.160
                                May 10, 2022 20:27:13.117367029 CEST5476149778185.19.85.160192.168.2.4
                                May 10, 2022 20:27:13.618872881 CEST4977854761192.168.2.4185.19.85.160
                                May 10, 2022 20:27:13.639410019 CEST5476149778185.19.85.160192.168.2.4
                                May 10, 2022 20:27:14.150048971 CEST4977854761192.168.2.4185.19.85.160
                                May 10, 2022 20:27:14.172974110 CEST5476149778185.19.85.160192.168.2.4
                                May 10, 2022 20:27:18.277035952 CEST4977954761192.168.2.4185.19.85.160
                                May 10, 2022 20:27:18.312689066 CEST5476149779185.19.85.160192.168.2.4
                                May 10, 2022 20:27:18.916165113 CEST4977954761192.168.2.4185.19.85.160
                                May 10, 2022 20:27:18.950690031 CEST5476149779185.19.85.160192.168.2.4
                                May 10, 2022 20:27:19.525528908 CEST4977954761192.168.2.4185.19.85.160
                                May 10, 2022 20:27:19.543219090 CEST5476149779185.19.85.160192.168.2.4
                                May 10, 2022 20:27:23.558701038 CEST4978154761192.168.2.4185.19.85.160
                                May 10, 2022 20:27:23.581326008 CEST5476149781185.19.85.160192.168.2.4
                                May 10, 2022 20:27:24.197825909 CEST4978154761192.168.2.4185.19.85.160
                                May 10, 2022 20:27:24.215622902 CEST5476149781185.19.85.160192.168.2.4
                                May 10, 2022 20:27:24.807208061 CEST4978154761192.168.2.4185.19.85.160
                                May 10, 2022 20:27:24.824640036 CEST5476149781185.19.85.160192.168.2.4
                                May 10, 2022 20:27:29.035579920 CEST4978254761192.168.2.4102.89.42.162
                                May 10, 2022 20:27:32.042187929 CEST4978254761192.168.2.4102.89.42.162
                                May 10, 2022 20:27:32.183749914 CEST5476149782102.89.42.162192.168.2.4
                                May 10, 2022 20:27:32.185914993 CEST4978254761192.168.2.4102.89.42.162
                                May 10, 2022 20:27:38.745908976 CEST4978254761192.168.2.4102.89.42.162
                                TimestampSource PortDest PortSource IPDest IP
                                May 10, 2022 20:26:05.667190075 CEST5607653192.168.2.48.8.8.8
                                May 10, 2022 20:26:05.832842112 CEST53560768.8.8.8192.168.2.4
                                May 10, 2022 20:26:31.565943956 CEST6064753192.168.2.48.8.8.8
                                May 10, 2022 20:26:31.736644983 CEST53606478.8.8.8192.168.2.4
                                May 10, 2022 20:26:57.445472956 CEST6490953192.168.2.48.8.8.8
                                May 10, 2022 20:26:57.582832098 CEST53649098.8.8.8192.168.2.4
                                May 10, 2022 20:27:28.897432089 CEST5650953192.168.2.48.8.8.8
                                May 10, 2022 20:27:29.034096956 CEST53565098.8.8.8192.168.2.4
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                May 10, 2022 20:26:05.667190075 CEST192.168.2.48.8.8.80xef43Standard query (0)fastspeed.ddnsfree.comA (IP address)IN (0x0001)
                                May 10, 2022 20:26:31.565943956 CEST192.168.2.48.8.8.80xf54bStandard query (0)fastspeed.ddnsfree.comA (IP address)IN (0x0001)
                                May 10, 2022 20:26:57.445472956 CEST192.168.2.48.8.8.80x243aStandard query (0)fastspeed.ddnsfree.comA (IP address)IN (0x0001)
                                May 10, 2022 20:27:28.897432089 CEST192.168.2.48.8.8.80xb410Standard query (0)fastspeed.ddnsfree.comA (IP address)IN (0x0001)
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                May 10, 2022 20:26:05.832842112 CEST8.8.8.8192.168.2.40xef43No error (0)fastspeed.ddnsfree.com102.89.42.162A (IP address)IN (0x0001)
                                May 10, 2022 20:26:31.736644983 CEST8.8.8.8192.168.2.40xf54bNo error (0)fastspeed.ddnsfree.com102.89.42.162A (IP address)IN (0x0001)
                                May 10, 2022 20:26:57.582832098 CEST8.8.8.8192.168.2.40x243aNo error (0)fastspeed.ddnsfree.com102.89.42.162A (IP address)IN (0x0001)
                                May 10, 2022 20:27:29.034096956 CEST8.8.8.8192.168.2.40xb410No error (0)fastspeed.ddnsfree.com102.89.42.162A (IP address)IN (0x0001)

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:20:25:25
                                Start date:10/05/2022
                                Path:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\U7Ncg7oAyC.exe"
                                Imagebase:0xb80000
                                File size:664064 bytes
                                MD5 hash:1D2CA2D522F8F4E99609CF7E88E673B4
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.306915424.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.310994827.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.310994827.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.310994827.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                Target ID:1
                                Start time:20:25:38
                                Start date:10/05/2022
                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
                                Imagebase:0xc00000
                                File size:430592 bytes
                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Reputation:high

                                Target ID:2
                                Start time:20:25:39
                                Start date:10/05/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff647620000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:3
                                Start time:20:25:39
                                Start date:10/05/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmp43AF.tmp
                                Imagebase:0x1c0000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:5
                                Start time:20:25:45
                                Start date:10/05/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff647620000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:6
                                Start time:20:25:48
                                Start date:10/05/2022
                                Path:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                Imagebase:0x520000
                                File size:664064 bytes
                                MD5 hash:1D2CA2D522F8F4E99609CF7E88E673B4
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000000.298686733.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000000.298686733.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000000.298686733.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.519407419.0000000003A99000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000000.301869693.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000000.301869693.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000000.301869693.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000000.300964814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000000.300964814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000000.300964814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.520939639.0000000005160000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.520939639.0000000005160000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000006.00000002.520939639.0000000005160000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.520899025.0000000005140000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.520899025.0000000005140000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000006.00000002.520899025.0000000005140000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000000.299335853.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000000.299335853.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000000.299335853.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.517591077.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.521004165.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.521004165.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.521004165.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000006.00000002.521004165.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.513680149.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.513680149.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.513680149.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                Target ID:16
                                Start time:20:25:55
                                Start date:10/05/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp6DAD.tmp
                                Imagebase:0x1c0000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:17
                                Start time:20:25:56
                                Start date:10/05/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff647620000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:18
                                Start time:20:25:58
                                Start date:10/05/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp7772.tmp
                                Imagebase:0x1c0000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:19
                                Start time:20:25:58
                                Start date:10/05/2022
                                Path:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\U7Ncg7oAyC.exe 0
                                Imagebase:0x420000
                                File size:664064 bytes
                                MD5 hash:1D2CA2D522F8F4E99609CF7E88E673B4
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000013.00000002.384938469.0000000002831000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.409136026.00000000043D9000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.409136026.00000000043D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.409136026.00000000043D9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                Target ID:21
                                Start time:20:25:59
                                Start date:10/05/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff647620000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:22
                                Start time:20:26:03
                                Start date:10/05/2022
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                Imagebase:0xcf0000
                                File size:664064 bytes
                                MD5 hash:1D2CA2D522F8F4E99609CF7E88E673B4
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000016.00000002.410739421.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000002.419521578.0000000004D99000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.419521578.0000000004D99000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.419521578.0000000004D99000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Antivirus matches:
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 63%, ReversingLabs
                                Reputation:low

                                Target ID:24
                                Start time:20:26:09
                                Start date:10/05/2022
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                Imagebase:0x3b0000
                                File size:664064 bytes
                                MD5 hash:1D2CA2D522F8F4E99609CF7E88E673B4
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000018.00000002.427276046.0000000002801000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000002.434654746.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.434654746.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.434654746.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                Target ID:25
                                Start time:20:26:13
                                Start date:10/05/2022
                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
                                Imagebase:0xc00000
                                File size:430592 bytes
                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET

                                Target ID:26
                                Start time:20:26:14
                                Start date:10/05/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff647620000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language

                                Target ID:27
                                Start time:20:26:14
                                Start date:10/05/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF4.tmp
                                Imagebase:0x1c0000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language

                                Target ID:28
                                Start time:20:26:16
                                Start date:10/05/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff647620000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language

                                Target ID:29
                                Start time:20:26:18
                                Start date:10/05/2022
                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LYKZypsugb.exe
                                Imagebase:0xc00000
                                File size:430592 bytes
                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET

                                Target ID:30
                                Start time:20:26:19
                                Start date:10/05/2022
                                Path:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\U7Ncg7oAyC.exe
                                Imagebase:0xd10000
                                File size:664064 bytes
                                MD5 hash:1D2CA2D522F8F4E99609CF7E88E673B4
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000001E.00000002.416390532.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001E.00000000.379537717.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000000.379537717.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000001E.00000000.379537717.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001E.00000002.411971893.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000002.411971893.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000001E.00000002.411971893.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000001E.00000002.416870536.00000000042E9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001E.00000000.376862241.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000000.376862241.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000001E.00000000.376862241.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001E.00000000.378843242.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000000.378843242.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000001E.00000000.378843242.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001E.00000000.373615736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000000.373615736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000001E.00000000.373615736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                Target ID:31
                                Start time:20:26:19
                                Start date:10/05/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff647620000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language

                                Target ID:32
                                Start time:20:26:20
                                Start date:10/05/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LYKZypsugb" /XML "C:\Users\user\AppData\Local\Temp\tmpE07C.tmp
                                Imagebase:0x1c0000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language

                                Target ID:33
                                Start time:20:26:24
                                Start date:10/05/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff647620000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language

                                Target ID:34
                                Start time:20:26:28
                                Start date:10/05/2022
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Imagebase:0xaa0000
                                File size:664064 bytes
                                MD5 hash:1D2CA2D522F8F4E99609CF7E88E673B4
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000022.00000000.386853119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000022.00000000.386853119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000022.00000000.386853119.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000022.00000000.389457782.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000022.00000000.389457782.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000022.00000000.389457782.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000022.00000002.429959186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000022.00000002.429959186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000022.00000002.429959186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000022.00000002.432551676.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000022.00000002.432551676.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000022.00000002.432713600.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000022.00000002.432713600.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000022.00000000.394464414.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000022.00000000.394464414.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000022.00000000.394464414.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000022.00000000.393280850.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000022.00000000.393280850.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000022.00000000.393280850.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:14.4%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:35
                                  Total number of Limit Nodes:1
                                  execution_graph 10430 9c97cc8 10431 9c97d11 SetThreadContext 10430->10431 10433 9c97d89 10431->10433 10434 9c98188 10435 9c981d4 ReadProcessMemory 10434->10435 10437 9c9824c 10435->10437 10458 9c98418 10459 9c9849f CreateProcessA 10458->10459 10461 9c986f4 10459->10461 10469 9c97ba8 10470 9c97bec ResumeThread 10469->10470 10472 9c97c38 10470->10472 10438 54d8048 10439 54d805d 10438->10439 10442 9c97eb0 10439->10442 10443 9c97ef4 VirtualAllocEx 10442->10443 10445 54d807c 10443->10445 10462 54d8658 10463 54d87e3 10462->10463 10464 54d867e 10462->10464 10464->10463 10466 54d8250 10464->10466 10467 54d8930 PostMessageW 10466->10467 10468 54d89dd 10467->10468 10468->10464 10446 2d7c050 10447 2d7c077 10446->10447 10449 2d7c154 10447->10449 10450 2d7bc88 10447->10450 10451 2d7d508 CreateActCtxA 10450->10451 10453 2d7d60e 10451->10453 10473 2d77e20 10474 2d77e6d VirtualProtect 10473->10474 10475 2d77ed9 10474->10475 10454 9c98000 10455 9c9804c WriteProcessMemory 10454->10455 10457 9c980e5 10455->10457

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 2d73040-2d73065 1 2d73067 0->1 2 2d7306c-2d73089 0->2 1->2 3 2d73091 2->3 4 2d73098-2d730b4 3->4 5 2d730b6 4->5 6 2d730bd-2d730be 4->6 5->3 5->6 7 2d73117-2d73129 5->7 8 2d733b5-2d733cc 5->8 9 2d73213-2d73233 5->9 10 2d73252-2d7325f 5->10 11 2d733d1-2d733e9 5->11 12 2d7317e-2d7319e 5->12 13 2d73299-2d7329d 5->13 14 2d73238-2d7324d 5->14 15 2d73427-2d7343a 5->15 16 2d73385-2d73389 5->16 17 2d73264-2d7326d 5->17 18 2d730c3-2d730e8 5->18 19 2d731a3-2d731af 5->19 20 2d732e0-2d732ec 5->20 21 2d7336e-2d73380 5->21 22 2d7312e-2d73143 5->22 23 2d731cd-2d731e4 5->23 24 2d730ea-2d730ee 5->24 25 2d732c9-2d732db 5->25 26 2d731e9-2d731f5 5->26 27 2d73148-2d73161 call 2d73619 5->27 6->15 7->4 8->4 9->4 10->4 36 2d733f0-2d73406 11->36 37 2d733eb 11->37 12->4 38 2d732b0-2d732b7 13->38 39 2d7329f-2d732ae 13->39 14->4 30 2d7339c-2d733a3 16->30 31 2d7338b-2d7339a 16->31 32 2d73280-2d73287 17->32 33 2d7326f-2d7327e 17->33 18->4 42 2d731b6-2d731c8 19->42 43 2d731b1 19->43 40 2d732f3-2d73309 20->40 41 2d732ee 20->41 21->4 22->4 23->4 34 2d73101-2d73108 24->34 35 2d730f0-2d730ff 24->35 25->4 28 2d731f7 26->28 29 2d731fc-2d7320e 26->29 50 2d73167-2d73179 27->50 28->29 29->4 45 2d733aa-2d733b0 30->45 31->45 47 2d7328e-2d73294 32->47 33->47 48 2d7310f-2d73115 34->48 35->48 57 2d7340d-2d73422 36->57 58 2d73408 36->58 37->36 49 2d732be-2d732c4 38->49 39->49 59 2d73310-2d73326 40->59 60 2d7330b 40->60 41->40 42->4 43->42 45->4 47->4 48->4 49->4 50->4 57->4 58->57 63 2d7332d-2d73343 59->63 64 2d73328 59->64 60->59 66 2d73345 63->66 67 2d7334a-2d73369 63->67 64->63 66->67 67->4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 5LK,$5LK,$D@c,$Kp8$xaw5$5)}
                                  • API String ID: 0-1743555949
                                  • Opcode ID: 51d251a1625d3679267b13cf1cc5849b1a145487538f7438fd70ac86004d050e
                                  • Instruction ID: eaecc7078eed4e0c9b63c3c4390fe7fe639652c48684d6b2dac0f7b283e946b3
                                  • Opcode Fuzzy Hash: 51d251a1625d3679267b13cf1cc5849b1a145487538f7438fd70ac86004d050e
                                  • Instruction Fuzzy Hash: 0AC13AB0D0420ADFCB54CFA5C4848AEFBB2FF89300B649599D516A7314E738EA46DF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 70 2d72f39-2d73065 71 2d73067 70->71 72 2d7306c-2d73089 70->72 71->72 73 2d73091 72->73 74 2d73098-2d730b4 73->74 75 2d730b6 74->75 76 2d730bd-2d730be 74->76 75->73 75->76 77 2d73117-2d73129 75->77 78 2d733b5-2d733cc 75->78 79 2d73213-2d73233 75->79 80 2d73252-2d7325f 75->80 81 2d733d1-2d733e9 75->81 82 2d7317e-2d7319e 75->82 83 2d73299-2d7329d 75->83 84 2d73238-2d7324d 75->84 85 2d73427-2d7343a 75->85 86 2d73385-2d73389 75->86 87 2d73264-2d7326d 75->87 88 2d730c3-2d730e8 75->88 89 2d731a3-2d731af 75->89 90 2d732e0-2d732ec 75->90 91 2d7336e-2d73380 75->91 92 2d7312e-2d73143 75->92 93 2d731cd-2d731e4 75->93 94 2d730ea-2d730ee 75->94 95 2d732c9-2d732db 75->95 96 2d731e9-2d731f5 75->96 97 2d73148-2d73161 call 2d73619 75->97 76->85 77->74 78->74 79->74 80->74 106 2d733f0-2d73406 81->106 107 2d733eb 81->107 82->74 108 2d732b0-2d732b7 83->108 109 2d7329f-2d732ae 83->109 84->74 100 2d7339c-2d733a3 86->100 101 2d7338b-2d7339a 86->101 102 2d73280-2d73287 87->102 103 2d7326f-2d7327e 87->103 88->74 112 2d731b6-2d731c8 89->112 113 2d731b1 89->113 110 2d732f3-2d73309 90->110 111 2d732ee 90->111 91->74 92->74 93->74 104 2d73101-2d73108 94->104 105 2d730f0-2d730ff 94->105 95->74 98 2d731f7 96->98 99 2d731fc-2d7320e 96->99 120 2d73167-2d73179 97->120 98->99 99->74 115 2d733aa-2d733b0 100->115 101->115 117 2d7328e-2d73294 102->117 103->117 118 2d7310f-2d73115 104->118 105->118 127 2d7340d-2d73422 106->127 128 2d73408 106->128 107->106 119 2d732be-2d732c4 108->119 109->119 129 2d73310-2d73326 110->129 130 2d7330b 110->130 111->110 112->74 113->112 115->74 117->74 118->74 119->74 120->74 127->74 128->127 133 2d7332d-2d73343 129->133 134 2d73328 129->134 130->129 136 2d73345 133->136 137 2d7334a-2d73369 133->137 134->133 136->137 137->74
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 5LK,$D@c,$Kp8$xaw5$5)}
                                  • API String ID: 0-3835910141
                                  • Opcode ID: 7586c0bd547b937b5244c20ea4c86ba2baf958ae20c0c266a7ea6e7ba9418513
                                  • Instruction ID: 85639d49d727975715b22566aaeecd9acc8c285fdae20ff9e0408154a919301c
                                  • Opcode Fuzzy Hash: 7586c0bd547b937b5244c20ea4c86ba2baf958ae20c0c266a7ea6e7ba9418513
                                  • Instruction Fuzzy Hash: 34F17A70E1424ADFCB45CFA5C4954EEFBB2FF89340B1485AAC841A7305E739A94ADF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 290 2d70470-2d704a1 291 2d704a3 290->291 292 2d704a8-2d70501 290->292 291->292 293 2d7050b-2d7055d 292->293 297 2d70566-2d70f37 293->297 298 2d7055f 293->298 298->297
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ;7r
                                  • API String ID: 0-1660951293
                                  • Opcode ID: f72753b9c073687a35d825a3cfe979f7d863866c1bf2f55508bcc8445a66b524
                                  • Instruction ID: 68b718a7009aa2b2c6fff175c86d720221002ad5e60857faf069eb0eaf58eaeb
                                  • Opcode Fuzzy Hash: f72753b9c073687a35d825a3cfe979f7d863866c1bf2f55508bcc8445a66b524
                                  • Instruction Fuzzy Hash: 8131D671E056189FEB58CFABD8406DEFBF3ABC8301F14C1BAD508A6264EB3509468F11
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.311533295.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_54d0000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ac299cb88214612d6fb146129ade94c8d43117606d4a314e7b959636047fd4c2
                                  • Instruction ID: ba7bf0ab07ac33c9f9ff632981f7069fc69466ad458c3219723a155892f55fa5
                                  • Opcode Fuzzy Hash: ac299cb88214612d6fb146129ade94c8d43117606d4a314e7b959636047fd4c2
                                  • Instruction Fuzzy Hash: 72C1BA71B046449FDB29EB76C460BABB3E6BFC9604F1444AED246CB394DB35E901CB21
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b819384a83d214f38e875115128e7a7475c98d553b0da3d3b518085d4e8604eb
                                  • Instruction ID: ab499c68ab0237e51d20a199cc3e63ddf6a2aa8c713504ad7d42eb08ad2fec11
                                  • Opcode Fuzzy Hash: b819384a83d214f38e875115128e7a7475c98d553b0da3d3b518085d4e8604eb
                                  • Instruction Fuzzy Hash: 96A13974E052888FCB04CFA9C8956EDBBF2EF89310F14816AD849BB355D735A946CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c9cb42d75191c272f7a426aca3f8df3609c89b7549363f9bde58e7d03f1b0bff
                                  • Instruction ID: 6098871a38839869bda0b3dd2f30fa4e35a16efbb26a46200a83d8d51e1f50db
                                  • Opcode Fuzzy Hash: c9cb42d75191c272f7a426aca3f8df3609c89b7549363f9bde58e7d03f1b0bff
                                  • Instruction Fuzzy Hash: 4681B174E012198FCB08CFA9C984AAEFBB2FF89300F24852AD519BB354E7359945CF55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 421ca85a24010da5fc6e9ae525c2a32b0b8d253b0e0765e0600b01d71e6e046e
                                  • Instruction ID: c3b9a6ca04ce2b2acf57d164d93f043a4f29bb617313fcaaac1693baffc54656
                                  • Opcode Fuzzy Hash: 421ca85a24010da5fc6e9ae525c2a32b0b8d253b0e0765e0600b01d71e6e046e
                                  • Instruction Fuzzy Hash: BB512774E042099FDB08DFA5D8445AEFBB2FF89314F14846AD416AB364EB389D41CF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 24d3aced5b3e599ba8a378f8c73adf516085fefedd69f17dd69bc8c16db39c72
                                  • Instruction ID: d63a2ced95e620796501311bbc776aeac94fc0772b4bd855aee586fe95eaf170
                                  • Opcode Fuzzy Hash: 24d3aced5b3e599ba8a378f8c73adf516085fefedd69f17dd69bc8c16db39c72
                                  • Instruction Fuzzy Hash: 6C310871E006588BDB18CFAAD8446DEFBF7BFC9310F14C16AD909A6259DB340946CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 140 9c98418-9c984b1 142 9c984fa-9c98522 140->142 143 9c984b3-9c984ca 140->143 146 9c98568-9c985be 142->146 147 9c98524-9c98538 142->147 143->142 148 9c984cc-9c984d1 143->148 157 9c985c0-9c985d4 146->157 158 9c98604-9c986f2 CreateProcessA 146->158 147->146 155 9c9853a-9c9853f 147->155 149 9c984d3-9c984dd 148->149 150 9c984f4-9c984f7 148->150 152 9c984df 149->152 153 9c984e1-9c984f0 149->153 150->142 152->153 153->153 156 9c984f2 153->156 159 9c98541-9c9854b 155->159 160 9c98562-9c98565 155->160 156->150 157->158 166 9c985d6-9c985db 157->166 176 9c986fb-9c987e0 158->176 177 9c986f4-9c986fa 158->177 161 9c9854d 159->161 162 9c9854f-9c9855e 159->162 160->146 161->162 162->162 165 9c98560 162->165 165->160 167 9c985dd-9c985e7 166->167 168 9c985fe-9c98601 166->168 170 9c985e9 167->170 171 9c985eb-9c985fa 167->171 168->158 170->171 171->171 172 9c985fc 171->172 172->168 189 9c987f0-9c987f4 176->189 190 9c987e2-9c987e6 176->190 177->176 192 9c98804-9c98808 189->192 193 9c987f6-9c987fa 189->193 190->189 191 9c987e8 190->191 191->189 195 9c98818-9c9881c 192->195 196 9c9880a-9c9880e 192->196 193->192 194 9c987fc 193->194 194->192 198 9c9881e-9c98847 195->198 199 9c98852-9c9885d 195->199 196->195 197 9c98810 196->197 197->195 198->199
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 09C986DF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.314656729.0000000009C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 09C90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9c90000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: c2fa721c4a56dadb115a40a25eaf45ad816276bcefeb8eb4cc1b26ffcf2a93f8
                                  • Instruction ID: bf626a97959cfa15c237c1811d5f2f4b3bcc2d200837ff6c70a0cffdf16578e1
                                  • Opcode Fuzzy Hash: c2fa721c4a56dadb115a40a25eaf45ad816276bcefeb8eb4cc1b26ffcf2a93f8
                                  • Instruction Fuzzy Hash: 95C13671D142298FDF20CFA4D844BEEBBB1BF5A304F0095A9E509B7240DB749A89CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 203 2d7bc88-2d7d60c CreateActCtxA 208 2d7d615-2d7d69a 203->208 209 2d7d60e-2d7d614 203->209 218 2d7d6c7-2d7d6cf 208->218 219 2d7d69c-2d7d6bf 208->219 209->208 219->218
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 02D7D5F9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 583dd60adb2c19ed96f7f236dc3ffabf6bf47f70bb4f3b76aa38ef666e5e40b8
                                  • Instruction ID: 9068834cf0fe4336dcd7702ea8d2601b4e996bc95de4f28def63a90d2b53714b
                                  • Opcode Fuzzy Hash: 583dd60adb2c19ed96f7f236dc3ffabf6bf47f70bb4f3b76aa38ef666e5e40b8
                                  • Instruction Fuzzy Hash: C95104B1D0421C8FDB20DFA4C840BCEBBB5BF55308F1180A9D609AB251EB756A89CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 223 9c98000-9c9806b 225 9c9806d-9c9807f 223->225 226 9c98082-9c980e3 WriteProcessMemory 223->226 225->226 228 9c980ec-9c9813e 226->228 229 9c980e5-9c980eb 226->229 229->228
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09C980D3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.314656729.0000000009C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 09C90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9c90000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 71b044bcf67b4d10fe60f421140fbbbf1926e5ef671ee123075b06079a8d8110
                                  • Instruction ID: 0472d61897bedb194be8e3df65e5e735ea7772c26ba47cea1fcef90daa1ad16a
                                  • Opcode Fuzzy Hash: 71b044bcf67b4d10fe60f421140fbbbf1926e5ef671ee123075b06079a8d8110
                                  • Instruction Fuzzy Hash: 7C41A8B5D052589FCF00CFA9D984AEEFBF1BB49314F14942AE818BB200D775AA45CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 234 9c98188-9c9824a ReadProcessMemory 237 9c9824c-9c98252 234->237 238 9c98253-9c982a5 234->238 237->238
                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09C9823A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.314656729.0000000009C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 09C90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9c90000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: e32cc9479e72c73a51c1204b6b2dabf94c286ec339117d8c34793c83a4efde5d
                                  • Instruction ID: 5da28137d997a0ca38cc781d912b6462b5971fff209197ced460346625459ec1
                                  • Opcode Fuzzy Hash: e32cc9479e72c73a51c1204b6b2dabf94c286ec339117d8c34793c83a4efde5d
                                  • Instruction Fuzzy Hash: B241C8B5D042589FCF00CFAAD884AEEFBB1BF19310F14942AE914B7200C735A945CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 243 9c97eb0-9c97f6a VirtualAllocEx 246 9c97f6c-9c97f72 243->246 247 9c97f73-9c97fbd 243->247 246->247
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 09C97F5A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.314656729.0000000009C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 09C90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9c90000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 9b54c84c0572497a1f08c76f53c93d32df0a2f53d50b6bbdd6e54a5fdd4434c2
                                  • Instruction ID: 142b0b8597401ea753dbda7b51673d8798e58f088a3772186c3991fb085f6150
                                  • Opcode Fuzzy Hash: 9b54c84c0572497a1f08c76f53c93d32df0a2f53d50b6bbdd6e54a5fdd4434c2
                                  • Instruction Fuzzy Hash: 1631A8B9D042589FCF10CFA9E984ADEFBB1BB59310F14942AE815BB300D735A946CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 252 2d77e18-2d77ed7 VirtualProtect 254 2d77ee0-2d77f1c 252->254 255 2d77ed9-2d77edf 252->255 255->254
                                  APIs
                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02D77EC7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: 75173493062d67a93e2e8a5dbd42dc725e16d281d2658401fff110e0d3c1583a
                                  • Instruction ID: 772d6b5cfecfb14a8ef3c71ddd0b9e634aefa692c97f9687b4268f8037b76d5e
                                  • Opcode Fuzzy Hash: 75173493062d67a93e2e8a5dbd42dc725e16d281d2658401fff110e0d3c1583a
                                  • Instruction Fuzzy Hash: 4731A6B9D002189FCF10CFA9E584AEEFBB0BB19310F14942AE814BB310D375A946CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 258 2d77e20-2d77ed7 VirtualProtect 260 2d77ee0-2d77f1c 258->260 261 2d77ed9-2d77edf 258->261 261->260
                                  APIs
                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02D77EC7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: a97fdcb84ae32d0144e4b194072c66280ab8f6d1dec1a1df79de48ccdf3f77c2
                                  • Instruction ID: f347cd064b53c223f49d11c0175d881fd21307df641a182948d2d488c36c4283
                                  • Opcode Fuzzy Hash: a97fdcb84ae32d0144e4b194072c66280ab8f6d1dec1a1df79de48ccdf3f77c2
                                  • Instruction Fuzzy Hash: 513198B9D042589FCF10CFA9E584AEEFBB0BB19310F14942AE814B7310D774A945CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 264 9c97cc8-9c97d28 266 9c97d2a-9c97d3c 264->266 267 9c97d3f-9c97d87 SetThreadContext 264->267 266->267 269 9c97d89-9c97d8f 267->269 270 9c97d90-9c97ddc 267->270 269->270
                                  APIs
                                  • SetThreadContext.KERNELBASE(?,?), ref: 09C97D77
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.314656729.0000000009C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 09C90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9c90000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: ContextThread
                                  • String ID:
                                  • API String ID: 1591575202-0
                                  • Opcode ID: faa89818084baaf1cf11f0cefac94e6eb6c8fbf53c415fe0d8f1ce54f42420b8
                                  • Instruction ID: a4ad71fa54afb2a76ba07d6e0a98795f5e488c00ba0d8bfb706928188558dc9f
                                  • Opcode Fuzzy Hash: faa89818084baaf1cf11f0cefac94e6eb6c8fbf53c415fe0d8f1ce54f42420b8
                                  • Instruction Fuzzy Hash: 1031BCB5D112589FDF10CFA9D884AEEBBF1BF48314F14842AE414B7240D738A985CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 275 54d8250-54d89db PostMessageW 277 54d89dd-54d89e3 275->277 278 54d89e4-54d8a16 275->278 277->278
                                  APIs
                                  • PostMessageW.USER32(?,?,?,00000000), ref: 054D89CB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.311533295.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_54d0000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: 7ae65a92f85e35b1edf9bfbd6c3c080cd9c9a77f602e5d88c38235105a4a501a
                                  • Instruction ID: 9e7f7bb1067566e2e5fe71f7cdbd26a76c03e5c0d336edda0098c2cf88bf4bde
                                  • Opcode Fuzzy Hash: 7ae65a92f85e35b1edf9bfbd6c3c080cd9c9a77f602e5d88c38235105a4a501a
                                  • Instruction Fuzzy Hash: 593186B9D04258AFCB10CFA9E484ADEFBF4AB19314F14906AE814BB310D375A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 281 9c97ba8-9c97c36 ResumeThread 284 9c97c38-9c97c3e 281->284 285 9c97c3f-9c97c81 281->285 284->285
                                  APIs
                                  • ResumeThread.KERNELBASE(?), ref: 09C97C26
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.314656729.0000000009C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 09C90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9c90000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 4a8aadcfbb88ee4ab85ebe3f74806773f6f924df49f39c4f6b9525f544aacf58
                                  • Instruction ID: ff3cdc28a082c3b8ec314bf14616f1e4717a1220427379fb774097470ab85e22
                                  • Opcode Fuzzy Hash: 4a8aadcfbb88ee4ab85ebe3f74806773f6f924df49f39c4f6b9525f544aacf58
                                  • Instruction Fuzzy Hash: 2A31C9B4D152189FCF10CFA9E984A9EFBB4AB48314F14842AE814B7300C734A941CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306321453.00000000013ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 013ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_13ed000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e0399683460228f7aff952f666d6d213f5c463e1207cae100648f5945b0ff3d5
                                  • Instruction ID: 20d5be02d17acf3e2a2f0fc027153e2456c0e372d61aacd5324cd854b446859c
                                  • Opcode Fuzzy Hash: e0399683460228f7aff952f666d6d213f5c463e1207cae100648f5945b0ff3d5
                                  • Instruction Fuzzy Hash: BD2145B2504344DFCB01DF54D9C8B2ABFA5FB8832CF24C569E9054B286C336D856CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306433504.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_13fd000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d09c777c3f76a081e3b038f38dffbe55e1ca32732973d3b2a4355906939365be
                                  • Instruction ID: 8583925d8e3dc21b3b304104d51a7d2b2075851cbccc2e92957f3b00d0543855
                                  • Opcode Fuzzy Hash: d09c777c3f76a081e3b038f38dffbe55e1ca32732973d3b2a4355906939365be
                                  • Instruction Fuzzy Hash: E5216471508244DFCB11DF64D8C8B26BB65FB88358F20C5ADEA0A4B346C33BD807CA61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306433504.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_13fd000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a5933c001d7e8d7f92060317b49b822bc3f825f4b8256d7b7ff2f90ecc6e5de2
                                  • Instruction ID: 14c239679e36239ca220109c8536e186c339395a64da1af9aaf75a1c9300f5c8
                                  • Opcode Fuzzy Hash: a5933c001d7e8d7f92060317b49b822bc3f825f4b8256d7b7ff2f90ecc6e5de2
                                  • Instruction Fuzzy Hash: 5C212979504244EFDB01DF94D5C8B26BB65FB84328F24C5ADDA094B246C337D856CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306433504.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_13fd000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b074ab95d7d34f5c8a834a6f0f857acb7a20dc9ad715bd7d2f1a23bd2090a2c4
                                  • Instruction ID: 9a8079b41065b874ca78037af2d1e18c9660b5639390e9b0bf24b9427c5299c3
                                  • Opcode Fuzzy Hash: b074ab95d7d34f5c8a834a6f0f857acb7a20dc9ad715bd7d2f1a23bd2090a2c4
                                  • Instruction Fuzzy Hash: 48218E755093808FCB03CF24D994B15BF71EB46218F28C5EAD9498B667C33A980ACB62
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306321453.00000000013ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 013ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_13ed000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d64477db9f9483eff024ad21beefddb018fc80a7aa46d68ce26437d5177f2104
                                  • Instruction ID: 66f175680c70b5278ab6a2316779b9122c58e5c8926e38820f5b76534b77311b
                                  • Opcode Fuzzy Hash: d64477db9f9483eff024ad21beefddb018fc80a7aa46d68ce26437d5177f2104
                                  • Instruction Fuzzy Hash: 6B11B176404380CFCB12CF54D9C4B16BFB1FB88328F28C6A9D8450B696C336D45ACBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306433504.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_13fd000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7a673041faea760638411a329164a2550987f39295efeab768d269dd870a3f12
                                  • Instruction ID: 230b71b31dbf9e8ba15c289557aadf4bf00643fd52a3c5c1e3c207f0b1018251
                                  • Opcode Fuzzy Hash: 7a673041faea760638411a329164a2550987f39295efeab768d269dd870a3f12
                                  • Instruction Fuzzy Hash: A911BE79504280DFCB02CF54C5C4B15FF71FB84228F28C6AED9494B656C33AD45ACB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306321453.00000000013ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 013ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_13ed000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4ce3420ad33f2673913ba990b75f23b72aa1fedee3e640403b2d427a2f6c417f
                                  • Instruction ID: 7395252ed20a098d9509a77bd690b1bcc2cb9790113445b4e0cf783e4f0b705e
                                  • Opcode Fuzzy Hash: 4ce3420ad33f2673913ba990b75f23b72aa1fedee3e640403b2d427a2f6c417f
                                  • Instruction Fuzzy Hash: B501F7710483E49AE7108F65CD88B66BFDCDF4126CF09C55AEE054B2C6D37A9440C6B1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306321453.00000000013ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 013ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_13ed000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 94a1328fe445ee2d167c2b2060686ba654928ef18c84e8ee712ebd0d920db91d
                                  • Instruction ID: e9821d88eacc21dc884a9b4c75a92eb31d2dbadd88d43b03975264bdca8deac9
                                  • Opcode Fuzzy Hash: 94a1328fe445ee2d167c2b2060686ba654928ef18c84e8ee712ebd0d920db91d
                                  • Instruction Fuzzy Hash: 1EF0C2724083949EEB108F59CC88B62FFD8EB81238F18C05AED080B286C3799844CAB0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 0z$$[6#5
                                  • API String ID: 0-1807647604
                                  • Opcode ID: 416af33952b9d0a86d4843bc8f692e333f3be49ca743fdc0bc4834dcb7704acf
                                  • Instruction ID: ac9f9425ba4d982d5114982b5dbd0b4df496db0baeef6aec2e34b43a76176870
                                  • Opcode Fuzzy Hash: 416af33952b9d0a86d4843bc8f692e333f3be49ca743fdc0bc4834dcb7704acf
                                  • Instruction Fuzzy Hash: 2E810074E152198FCB44CFA9D68099EFBF1FF88350B24956AE515AB360E334AA42CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 0z$$[6#5
                                  • API String ID: 0-1807647604
                                  • Opcode ID: cd2223582ab43424c53a307c5cf7613821188a345cbf39eb0b1c81f3c9982443
                                  • Instruction ID: 3bed40026d1906f2e536df4e036eacac9e7f45eec25c15419e8448d951a69e6b
                                  • Opcode Fuzzy Hash: cd2223582ab43424c53a307c5cf7613821188a345cbf39eb0b1c81f3c9982443
                                  • Instruction Fuzzy Hash: 02810274E152198FCB44CFA8D58499EFBF1FF88350B2495AAE515AB360E334AE42CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.314656729.0000000009C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 09C90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9c90000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $$*
                                  • API String ID: 0-3931512670
                                  • Opcode ID: 6629018b4da0af0215b33a7b3c40335c3d4e409f155b02dce608459f5a3a3d58
                                  • Instruction ID: 191bc8222174b68eae5410e88a2b42e3553c0cb2f67f8f045d474f0a8e7dc27e
                                  • Opcode Fuzzy Hash: 6629018b4da0af0215b33a7b3c40335c3d4e409f155b02dce608459f5a3a3d58
                                  • Instruction Fuzzy Hash: 46414171E15A588BEB2CCF6BCD4478EFAF3AFC9341F14C1BA840DAA255EB7005428E11
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: /Ml
                                  • API String ID: 0-3801622744
                                  • Opcode ID: 8eca21b7aeff1eb66499203cad84d94821be81b493888c2490bfe57d43186d2b
                                  • Instruction ID: 20519a5579e979ee2abe17c0e33c1687c51680fca640dd5921e452a0907e540c
                                  • Opcode Fuzzy Hash: 8eca21b7aeff1eb66499203cad84d94821be81b493888c2490bfe57d43186d2b
                                  • Instruction Fuzzy Hash: 6D4105B4E1524ACFCB44CFA9D5805AEFBB2AF89300F24D56AC805A7358E3349A41CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: /Ml
                                  • API String ID: 0-3801622744
                                  • Opcode ID: e67fa8448f5d5187dbab85168764d1c07c95f8c925009f7f8b0564b3c59a1367
                                  • Instruction ID: fdf7342503339149a642ff3f393d4e09942a4e9b0af95022c6579b0b700767d4
                                  • Opcode Fuzzy Hash: e67fa8448f5d5187dbab85168764d1c07c95f8c925009f7f8b0564b3c59a1367
                                  • Instruction Fuzzy Hash: 2F41E4B4E1520ADBCB44CFA9D5815AEFBF2EB88300F64D46AC905B7318E7349A41CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.311533295.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_54d0000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 7
                                  • API String ID: 0-1790921346
                                  • Opcode ID: 357fadd55ef5ea4ac03287d33ed3bc9628a20c543b742124f270f7b15f70814d
                                  • Instruction ID: 9d2414d433b9dd1f1efa4fd14be0d89f5c437ec1d76c55f60ea9fbc80250575d
                                  • Opcode Fuzzy Hash: 357fadd55ef5ea4ac03287d33ed3bc9628a20c543b742124f270f7b15f70814d
                                  • Instruction Fuzzy Hash: DD414371D05A588BEB5CCF6B8D5469EFAF3AFC8201F14C1BAC50CAB255EB3049428E15
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.314656729.0000000009C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 09C90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_9c90000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $
                                  • API String ID: 0-3993045852
                                  • Opcode ID: 269f182c06117d11e17a13c49c56550e818108e3d06722ada7f7d7c2150372b8
                                  • Instruction ID: e1250fb7bd39d0c8eda8bbf5ac86e9874939f7a6ea2a22a8d9dba142a23779b1
                                  • Opcode Fuzzy Hash: 269f182c06117d11e17a13c49c56550e818108e3d06722ada7f7d7c2150372b8
                                  • Instruction Fuzzy Hash: B0410571D11A588BEB1CCF6BCD4469EFAF3AFC9301F14C1BA941CAA254EB7005428F51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 857af1a34158f816e0439ced0228487b645b3a31bb67036b26a1d6dca14d52b0
                                  • Instruction ID: 1df4c5d7e8c6e3d31c8f73cda62eb74415fe0c8233eeb3565f2401ff288372c9
                                  • Opcode Fuzzy Hash: 857af1a34158f816e0439ced0228487b645b3a31bb67036b26a1d6dca14d52b0
                                  • Instruction Fuzzy Hash: 3561E575E0520A9FCB04CFA9D481AEEFBB2FB88310F14966AE519A7314E374D941CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 397b902ad5b8476befb0e564af9e6392af1b091206e98628b85687f4140c328a
                                  • Instruction ID: de628fd8e2382f92b019727da62a6af2a21ac034d9994fb85b05a70dec7b0703
                                  • Opcode Fuzzy Hash: 397b902ad5b8476befb0e564af9e6392af1b091206e98628b85687f4140c328a
                                  • Instruction Fuzzy Hash: 4D71B1B4E0520ADFCB05CF99C5809AEFBB2FF48314F14855AD455AB318E338A942CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 431495ef0481f231834d3d53af43bd4d546c66d52426167a9f501c2d721d6e26
                                  • Instruction ID: 4b89eb9bab9ac0ff68b6adc25d713fc5b97e9453cdab92e62f8aa755d6f9c900
                                  • Opcode Fuzzy Hash: 431495ef0481f231834d3d53af43bd4d546c66d52426167a9f501c2d721d6e26
                                  • Instruction Fuzzy Hash: B861B2B4E0420A9FCB05CFA9C5809AEFBB2FF48314F14855AD455A7318E338AD42CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7dcd2d181ae94388b09910af3705af4825993625b1fbe083cf68ec33ecf6c4b4
                                  • Instruction ID: 3fb986f344faf4e7c360d879d040351a3f3579c1d340749a392638913d96d3d5
                                  • Opcode Fuzzy Hash: 7dcd2d181ae94388b09910af3705af4825993625b1fbe083cf68ec33ecf6c4b4
                                  • Instruction Fuzzy Hash: 1351F274E052098FCB04CFA9D5805DEFBF2FF89214F28956AD855B7324E7349A02CB65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 94f98c1383fc7c62a0c42c99813962a23721220fa91d3fce55da962311f0d601
                                  • Instruction ID: 4f0cff07d77fb927222c030c18157dbfa36430773ed26d674892ad4286a60b0f
                                  • Opcode Fuzzy Hash: 94f98c1383fc7c62a0c42c99813962a23721220fa91d3fce55da962311f0d601
                                  • Instruction Fuzzy Hash: B051E1B4E052098FCB04CFAAE58059EFBF2FB88214F24952AD855B7324E7349A02CB55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b58cd9a0b73bfcfd1c2741b5d6703b8e9b785cebb29e26422b41b4b48998c406
                                  • Instruction ID: 20419f6641497ab0bc79a249fb26e0c49856f6f5aad98dffa7af2604d691afa5
                                  • Opcode Fuzzy Hash: b58cd9a0b73bfcfd1c2741b5d6703b8e9b785cebb29e26422b41b4b48998c406
                                  • Instruction Fuzzy Hash: 95415FB1E056588BEB28CF6B9D4429EFBF3AFC9300F14C1BA954CA6255EB340A458F51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.311533295.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_54d0000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 76ab0556796debf707c9b63e3ed771cfea8180be45287583ff97425bb791c0d5
                                  • Instruction ID: 45e0c9317f7c0201ae3bc8d64277375145e7b917a03b717fd0dbfffac331a463
                                  • Opcode Fuzzy Hash: 76ab0556796debf707c9b63e3ed771cfea8180be45287583ff97425bb791c0d5
                                  • Instruction Fuzzy Hash: 41416271D05A588FE75DCF6B8D5169AFAF3AFC5201F18C1FAC40CAA265EB3015468E11
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7d099ffbcce8bee5b1e0477f7ecac9fc2f88659e5edd9ed53d4ec38e793e954f
                                  • Instruction ID: 199f66e78039a02e6758b96851486edaddf67da0b53585a787c2581c80082dbe
                                  • Opcode Fuzzy Hash: 7d099ffbcce8bee5b1e0477f7ecac9fc2f88659e5edd9ed53d4ec38e793e954f
                                  • Instruction Fuzzy Hash: 5F41E4B4E0420A9FCB04CFAAD5805AEFBF2BF98310F54D06AC915A6304E7389A41CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.306670858.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2d70000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 686eaade93cd169e7d6d742d0d7305fc2a09f87d184f7dab45feb6780b637b53
                                  • Instruction ID: e554bfa11ed560fbce655cceb2bfcaf1af07c0b86f3a42ab2759f2c64d1d92d4
                                  • Opcode Fuzzy Hash: 686eaade93cd169e7d6d742d0d7305fc2a09f87d184f7dab45feb6780b637b53
                                  • Instruction Fuzzy Hash: A541E5B4E0420A9FCB44CFAAD4805AEFBF2EF98310F54C56AC915A7314E7389A41CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:12.8%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:198
                                  Total number of Limit Nodes:19
                                  execution_graph 18910 62a5878 18911 62a5892 18910->18911 18914 62a54f8 18911->18914 18915 62a5522 18914->18915 18916 62a552a 18914->18916 18917 62a5559 18916->18917 18921 62a5608 18916->18921 18925 62a575f 18916->18925 18929 62a55f9 18916->18929 18924 62a5632 18921->18924 18922 62a5757 18922->18917 18924->18922 18933 62a3e98 18924->18933 18927 62a5699 18925->18927 18926 62a5757 18926->18917 18927->18926 18928 62a3e98 CreateWindowExW 18927->18928 18928->18926 18930 62a5606 18929->18930 18931 62a5757 18930->18931 18932 62a3e98 CreateWindowExW 18930->18932 18931->18917 18932->18931 18934 62a3ec6 18933->18934 18937 62a3f05 18933->18937 18935 62a3edf 18934->18935 18936 62a40b6 18934->18936 18934->18937 18935->18937 18942 62a47bf 18935->18942 18950 62a47d0 18935->18950 18958 62a41a0 18936->18958 18963 62a41b0 18936->18963 18937->18922 18944 62a47d0 18942->18944 18943 62a4872 18943->18937 18944->18943 18945 62a4868 18944->18945 18968 62a48b2 18944->18968 18975 62a48c0 18944->18975 18982 62a5772 18945->18982 18986 62a5780 18945->18986 18953 62a47f8 18950->18953 18951 62a4872 18951->18937 18952 62a4868 18956 62a5772 CreateWindowExW 18952->18956 18957 62a5780 CreateWindowExW 18952->18957 18953->18951 18953->18952 18954 62a48b2 CreateWindowExW 18953->18954 18955 62a48c0 CreateWindowExW 18953->18955 18954->18952 18955->18952 18956->18951 18957->18951 18959 62a41b0 18958->18959 18960 62a41c6 18959->18960 18961 62a48b2 CreateWindowExW 18959->18961 18962 62a48c0 CreateWindowExW 18959->18962 18960->18937 18961->18960 18962->18960 18964 62a41c2 18963->18964 18965 62a41c6 18964->18965 18966 62a48b2 CreateWindowExW 18964->18966 18967 62a48c0 CreateWindowExW 18964->18967 18965->18937 18966->18965 18967->18965 18969 62a49d6 18968->18969 18971 62a48e4 18968->18971 19000 62a44a8 18969->19000 18990 62a4a60 18971->18990 18995 62a4a70 18971->18995 18972 62a499c 18972->18945 18976 62a49d6 18975->18976 18979 62a48e4 18975->18979 18977 62a44a8 CreateWindowExW 18976->18977 18978 62a499c 18977->18978 18978->18945 18980 62a4a60 CreateWindowExW 18979->18980 18981 62a4a70 CreateWindowExW 18979->18981 18980->18978 18981->18978 18983 62a5788 18982->18983 18984 62a57b0 18983->18984 18985 62a3e98 CreateWindowExW 18983->18985 18984->18943 18985->18984 18988 62a5788 18986->18988 18987 62a57b0 18987->18943 18988->18987 18989 62a3e98 CreateWindowExW 18988->18989 18989->18987 18991 62a4a65 18990->18991 18993 62a54f8 CreateWindowExW 18991->18993 19007 62a54e5 18991->19007 18992 62a4b52 18992->18972 18993->18992 18996 62a4aa4 18995->18996 18998 62a54f8 CreateWindowExW 18996->18998 18999 62a54e5 CreateWindowExW 18996->18999 18997 62a4b52 18997->18972 18998->18997 18999->18997 19002 62a44cb 19000->19002 19001 62a4564 19003 62a4665 19001->19003 19004 62a41b0 CreateWindowExW 19001->19004 19002->19001 19013 62a58ea 19002->19013 19018 62a5995 19002->19018 19003->18972 19004->19001 19009 62a54f8 19007->19009 19008 62a5522 19008->18992 19009->19008 19010 62a5608 CreateWindowExW 19009->19010 19011 62a55f9 CreateWindowExW 19009->19011 19012 62a575f CreateWindowExW 19009->19012 19010->19008 19011->19008 19012->19008 19014 62a59da 19013->19014 19015 62a5922 19013->19015 19014->19001 19015->19014 19023 62a5a0a 19015->19023 19029 62a5a18 19015->19029 19020 62a5972 19018->19020 19019 62a59da 19019->19001 19020->19019 19021 62a5a0a CreateWindowExW 19020->19021 19022 62a5a18 CreateWindowExW 19020->19022 19021->19020 19022->19020 19024 62a5a18 19023->19024 19025 62a5a23 19024->19025 19035 62a5a82 19024->19035 19039 62a5a90 19024->19039 19025->19015 19026 62a5a3c 19026->19015 19031 62a5a1d 19029->19031 19030 62a5a23 19030->19015 19031->19030 19033 62a5a82 CreateWindowExW 19031->19033 19034 62a5a90 CreateWindowExW 19031->19034 19032 62a5a3c 19032->19015 19033->19032 19034->19032 19036 62a5a95 19035->19036 19037 62a5a9b 19036->19037 19043 62a14f8 19036->19043 19037->19026 19040 62a5aa9 19039->19040 19041 62a5a9b 19039->19041 19040->19041 19042 62a14f8 CreateWindowExW 19040->19042 19041->19026 19042->19041 19044 62a1508 19043->19044 19045 62a1575 19044->19045 19046 62a1a31 CreateWindowExW 19044->19046 19045->19037 19046->19045 18908 283bd00 DuplicateHandle 18909 283bd96 18908->18909 19047 283b6d0 GetCurrentProcess 19048 283b743 19047->19048 19049 283b74a GetCurrentThread 19047->19049 19048->19049 19050 283b780 19049->19050 19051 283b787 GetCurrentProcess 19049->19051 19050->19051 19052 283b7bd 19051->19052 19053 283b7e5 GetCurrentThreadId 19052->19053 19054 283b816 19053->19054 19117 28392f0 19118 28392ff 19117->19118 19121 28393e8 19117->19121 19129 28393d9 19117->19129 19122 28393fb 19121->19122 19123 2839413 19122->19123 19137 2839660 19122->19137 19141 2839670 19122->19141 19123->19118 19124 283940b 19124->19123 19125 2839610 GetModuleHandleW 19124->19125 19126 283963d 19125->19126 19126->19118 19130 28393fb 19129->19130 19131 2839413 19130->19131 19135 2839660 LoadLibraryExW 19130->19135 19136 2839670 LoadLibraryExW 19130->19136 19131->19118 19132 2839610 GetModuleHandleW 19134 283963d 19132->19134 19133 283940b 19133->19131 19133->19132 19134->19118 19135->19133 19136->19133 19138 2839684 19137->19138 19140 28396a9 19138->19140 19145 2838768 19138->19145 19140->19124 19142 2839684 19141->19142 19143 2838768 LoadLibraryExW 19142->19143 19144 28396a9 19142->19144 19143->19144 19144->19124 19146 2839850 LoadLibraryExW 19145->19146 19148 28398c9 19146->19148 19148->19140 19055 2836758 19057 2836766 19055->19057 19058 2836344 19055->19058 19059 283634f 19058->19059 19062 2836394 19059->19062 19061 283688d 19061->19057 19063 283639f 19062->19063 19066 28363c4 19063->19066 19065 2836962 19065->19061 19067 28363cf 19066->19067 19070 28363f4 19067->19070 19069 2836a62 19069->19065 19071 28363ff 19070->19071 19072 28371bc 19071->19072 19074 283b407 19071->19074 19072->19069 19075 283b429 19074->19075 19076 283b44d 19075->19076 19079 283b587 19075->19079 19083 283b5b8 19075->19083 19076->19072 19080 283b58b 19079->19080 19081 283b5ff 19080->19081 19087 283a0ec 19080->19087 19081->19076 19085 283b5c5 19083->19085 19084 283b5ff 19084->19076 19085->19084 19086 283a0ec 6 API calls 19085->19086 19086->19084 19088 283a0f7 19087->19088 19089 283c2f8 19088->19089 19091 283b904 19088->19091 19092 283b90f 19091->19092 19093 283c367 19092->19093 19094 28363f4 6 API calls 19092->19094 19101 283c3d3 19093->19101 19107 283c3e0 19093->19107 19094->19093 19095 283c375 19097 283e0f0 LoadLibraryExW GetModuleHandleW CreateWindowExW 19095->19097 19098 283e0d8 LoadLibraryExW GetModuleHandleW CreateWindowExW 19095->19098 19096 283c3a0 19096->19089 19097->19096 19098->19096 19102 283c40e 19101->19102 19104 283c437 19102->19104 19106 283c4df 19102->19106 19113 283b9a0 19102->19113 19105 283c4da KiUserCallbackDispatcher 19104->19105 19104->19106 19105->19106 19108 283c40e 19107->19108 19109 283b9a0 GetFocus 19108->19109 19110 283c437 19108->19110 19112 283c4df 19108->19112 19109->19110 19111 283c4da KiUserCallbackDispatcher 19110->19111 19110->19112 19111->19112 19114 283b9ab 19113->19114 19115 283ba14 GetFocus 19114->19115 19116 283c9f5 19114->19116 19115->19116 19116->19104

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 0283B730
                                  • GetCurrentThread.KERNEL32 ref: 0283B76D
                                  • GetCurrentProcess.KERNEL32 ref: 0283B7AA
                                  • GetCurrentThreadId.KERNEL32 ref: 0283B803
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.517196290.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_2830000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID: Qj:.
                                  • API String ID: 2063062207-4006226587
                                  • Opcode ID: eeb86bdbd77766cef0ad79b4a4c70d2911821787d9c88c916b35021c5c914322
                                  • Instruction ID: 68c7afd7aba34997ae8a1b6c2c26edd67380a6ae13ce9224ac8d470920644d96
                                  • Opcode Fuzzy Hash: eeb86bdbd77766cef0ad79b4a4c70d2911821787d9c88c916b35021c5c914322
                                  • Instruction Fuzzy Hash: 515144B89042498FDB14CFA9D5887DEBBF1EF48318F24845AD519E7390CB74A844CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 0283B730
                                  • GetCurrentThread.KERNEL32 ref: 0283B76D
                                  • GetCurrentProcess.KERNEL32 ref: 0283B7AA
                                  • GetCurrentThreadId.KERNEL32 ref: 0283B803
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.517196290.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_2830000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID: Qj:.
                                  • API String ID: 2063062207-4006226587
                                  • Opcode ID: e4af93c322815f972299736e39937b11e5b010157f44ff55564ac469ff992e5f
                                  • Instruction ID: 19bfc8b9963c2fd467b952568ad5e815836d9b16efaf585ca30d3dfe5931d40f
                                  • Opcode Fuzzy Hash: e4af93c322815f972299736e39937b11e5b010157f44ff55564ac469ff992e5f
                                  • Instruction Fuzzy Hash: 935143B89002498FDB14CFA9D588BEEBBF1EF48318F248459E419E7350DB74A844CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 38 283faa0-283fb60 39 283fb62-283fbc3 38->39 40 283fbc4-283fbd6 38->40 39->40 42 283fbe0-283fc5e 40->42 43 283fbd8 call 283da04 40->43 45 283fc60-283fc66 42->45 46 283fc69-283fc70 42->46 47 283fbdd-283fbde 43->47 45->46 48 283fc72-283fc78 46->48 49 283fc7b-283fd1a CreateWindowExW 46->49 48->49 51 283fd23-283fd5b 49->51 52 283fd1c-283fd22 49->52 56 283fd68 51->56 57 283fd5d-283fd60 51->57 52->51 58 283fd69 56->58 57->56 58->58
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0283FD0A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.517196290.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_2830000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID: Qj:.$Qj:.
                                  • API String ID: 716092398-141631473
                                  • Opcode ID: d4ef5e8a9ee12fd2d26804eafccd800123a818239f4cf161bc7de1e99c453ff5
                                  • Instruction ID: 9607c5275c5359456ffd3a7362b74687d1704cea31a3e78af435cfd1c95d2bea
                                  • Opcode Fuzzy Hash: d4ef5e8a9ee12fd2d26804eafccd800123a818239f4cf161bc7de1e99c453ff5
                                  • Instruction Fuzzy Hash: 68917B75C08388DFCB16CFA5C8A4AC9BFB1FF0A300F0A819AE444AB262D7345855CF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 59 283fbf8-283fc5e 60 283fc60-283fc66 59->60 61 283fc69-283fc70 59->61 60->61 62 283fc72-283fc78 61->62 63 283fc7b-283fcb3 61->63 62->63 64 283fcbb-283fd1a CreateWindowExW 63->64 65 283fd23-283fd5b 64->65 66 283fd1c-283fd22 64->66 70 283fd68 65->70 71 283fd5d-283fd60 65->71 66->65 72 283fd69 70->72 71->70 72->72
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0283FD0A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.517196290.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_2830000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID: Qj:.$Qj:.
                                  • API String ID: 716092398-141631473
                                  • Opcode ID: 7c34edb49d8be22c0be09ed4349d9ed3ca1ee3023aab8d3c6583bdae7785227b
                                  • Instruction ID: c897a63ad12f20e5aca8402ec171bac0602d59a7bebc9b1f93f67ffa64516da3
                                  • Opcode Fuzzy Hash: 7c34edb49d8be22c0be09ed4349d9ed3ca1ee3023aab8d3c6583bdae7785227b
                                  • Instruction Fuzzy Hash: F641CFB5D003099FDB15CFA9C884ADEBBB5BF48314F24812AE919AB310D774A885CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 109 28393e8-28393f0 110 28393fb-28393fd 109->110 111 28393f6 call 2838704 109->111 112 2839413-2839417 110->112 113 28393ff 110->113 111->110 114 283942b-283946c 112->114 115 2839419-2839423 112->115 164 2839405 call 2839660 113->164 165 2839405 call 2839670 113->165 120 2839479-2839487 114->120 121 283946e-2839476 114->121 115->114 116 283940b-283940d 116->112 118 2839548-2839608 116->118 157 2839610-283963b GetModuleHandleW 118->157 158 283960a-283960d 118->158 122 28394ab-28394ad 120->122 123 2839489-283948e 120->123 121->120 127 28394b0-28394b7 122->127 125 2839490-2839497 call 2838710 123->125 126 2839499 123->126 130 283949b-28394a9 125->130 126->130 131 28394c4-28394cb 127->131 132 28394b9-28394c1 127->132 130->127 134 28394d8-28394e1 call 2838720 131->134 135 28394cd-28394d5 131->135 132->131 139 28394e3-28394eb 134->139 140 28394ee-28394f3 134->140 135->134 139->140 142 2839511-2839515 140->142 143 28394f5-28394fc 140->143 162 2839518 call 2839940 142->162 163 2839518 call 2839968 142->163 143->142 144 28394fe-283950e call 2838730 call 2838740 143->144 144->142 147 283951b-283951e 150 2839541-2839547 147->150 151 2839520-283953e 147->151 151->150 159 2839644-2839658 157->159 160 283963d-2839643 157->160 158->157 160->159 162->147 163->147 164->116 165->116
                                  APIs
                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0283962E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.517196290.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_2830000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID: Qj:.
                                  • API String ID: 4139908857-4006226587
                                  • Opcode ID: e3c0c6e1fe1fc71fd431e61f5b03d12a9a37f555c2aaa3b32b611a9ca1bdd3e2
                                  • Instruction ID: 35e60b2a51a33911623556c6adeeb37a658e2966188e1383f5658d62fdb8327d
                                  • Opcode Fuzzy Hash: e3c0c6e1fe1fc71fd431e61f5b03d12a9a37f555c2aaa3b32b611a9ca1bdd3e2
                                  • Instruction Fuzzy Hash: 77710378A00B058FDB25DF29D45075AB7F2BF88218F008A2DD58AD7A50EB75E845CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 166 283fe03-283fe17 167 283fe19-283fe1b 166->167 168 283fe1d-283fe1f 166->168 167->168 169 283fe21-283fe23 call 283da3c 168->169 170 283fe25 168->170 169->170 176 283fe27 call 283fe03 170->176 177 283fe27 call 283fe40 170->177 172 283fe28-283feaa SetWindowLongW 173 283feb3-283fec7 172->173 174 283feac-283feb2 172->174 174->173 176->172 177->172
                                  APIs
                                  • SetWindowLongW.USER32(?,?,?), ref: 0283FE9D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.517196290.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_2830000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: LongWindow
                                  • String ID: Qj:.
                                  • API String ID: 1378638983-4006226587
                                  • Opcode ID: 545d6c1de3cbf03fff176eaeddfdf4bdfd9d10ef900524bbc09f6c1e6fe87b8e
                                  • Instruction ID: 6840279ccfe638e4d39218c376beb9ad23f867f93e2377800751b59fda88c811
                                  • Opcode Fuzzy Hash: 545d6c1de3cbf03fff176eaeddfdf4bdfd9d10ef900524bbc09f6c1e6fe87b8e
                                  • Instruction Fuzzy Hash: C0219AB9804248DFCB11DFA4E588BDABFF4EB48314F05845AE958AB212D735A904CFE1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 178 283bcf9-283bd94 DuplicateHandle 179 283bd96-283bd9c 178->179 180 283bd9d-283bdba 178->180 179->180
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0283BD87
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.517196290.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_2830000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID: Qj:.
                                  • API String ID: 3793708945-4006226587
                                  • Opcode ID: 54fdc9d18aaa5ea39f17696e5bd648b3213a059e30ca84894c4b9cfdec439db6
                                  • Instruction ID: 6e9a5e6235d29af80a05bc6afcea2c05220f33af7abbaec544444846b292f657
                                  • Opcode Fuzzy Hash: 54fdc9d18aaa5ea39f17696e5bd648b3213a059e30ca84894c4b9cfdec439db6
                                  • Instruction Fuzzy Hash: F021F3B9900208DFDF00CFA9D584ADEBBF5FB48324F14842AE958A7350C778A954CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 183 283bd00-283bd94 DuplicateHandle 184 283bd96-283bd9c 183->184 185 283bd9d-283bdba 183->185 184->185
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0283BD87
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.517196290.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_2830000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID: Qj:.
                                  • API String ID: 3793708945-4006226587
                                  • Opcode ID: 8d59db85f8c7ff9eff1e41d4e460ce8463d2dd93f65e03082660a2787ea35c61
                                  • Instruction ID: 01d4feb4a8aba1c8324e5436121ae6e3afd0be4e0b013b553a566be399f19806
                                  • Opcode Fuzzy Hash: 8d59db85f8c7ff9eff1e41d4e460ce8463d2dd93f65e03082660a2787ea35c61
                                  • Instruction Fuzzy Hash: E221D5B5900248DFDB10CFA9D584ADEBBF4FB48324F14841AE919A7350D374A954CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 188 2838768-2839890 190 2839892-2839895 188->190 191 2839898-28398c7 LoadLibraryExW 188->191 190->191 192 28398d0-28398ed 191->192 193 28398c9-28398cf 191->193 193->192
                                  APIs
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,028396A9,00000800,00000000,00000000), ref: 028398BA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.517196290.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_2830000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID: Qj:.
                                  • API String ID: 1029625771-4006226587
                                  • Opcode ID: 4f52f3e3518e220c70a5275f5dac6401cd5a925f34f3cf76ca5a239358fd9ac8
                                  • Instruction ID: 10837dd96303bf12293769807cfc83d30f31bfa1a42f0a7119167484a1e50bbb
                                  • Opcode Fuzzy Hash: 4f52f3e3518e220c70a5275f5dac6401cd5a925f34f3cf76ca5a239358fd9ac8
                                  • Instruction Fuzzy Hash: 6411D3BA9042499FDB10CF9AC444BDEBBF4EB88324F14842AD919A7700C3B5A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 196 2839849-2839890 197 2839892-2839895 196->197 198 2839898-28398c7 LoadLibraryExW 196->198 197->198 199 28398d0-28398ed 198->199 200 28398c9-28398cf 198->200 200->199
                                  APIs
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,028396A9,00000800,00000000,00000000), ref: 028398BA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.517196290.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_2830000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID: Qj:.
                                  • API String ID: 1029625771-4006226587
                                  • Opcode ID: dac59f5b0ccc3ca527c85752afb091a99d4e86afd676e611bdffe263381807c1
                                  • Instruction ID: f8ceaf7699d6d0fb0bd27b3e3a827e890a38dd612a45976b19f3687bb2779008
                                  • Opcode Fuzzy Hash: dac59f5b0ccc3ca527c85752afb091a99d4e86afd676e611bdffe263381807c1
                                  • Instruction Fuzzy Hash: B91114BAD002098FDB10DF99D444BDEFBF4EB88314F15842AD519A7600C774A545CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 203 28395c8-2839608 204 2839610-283963b GetModuleHandleW 203->204 205 283960a-283960d 203->205 206 2839644-2839658 204->206 207 283963d-2839643 204->207 205->204 207->206
                                  APIs
                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0283962E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.517196290.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_2830000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID: Qj:.
                                  • API String ID: 4139908857-4006226587
                                  • Opcode ID: 85884e511290933e0ef27e9061bbecb5f01bec48aa71025324605c183654f0ee
                                  • Instruction ID: 04284dde8b8c2ccee334554f445b603653a2e11f523681edb5fe58bfb37f384d
                                  • Opcode Fuzzy Hash: 85884e511290933e0ef27e9061bbecb5f01bec48aa71025324605c183654f0ee
                                  • Instruction Fuzzy Hash: E511E0B9D006498FCB10CF9AC444BDEFBF4EB88324F14852AD929A7600D3B5A545CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 209 283fe40-283feaa SetWindowLongW 210 283feb3-283fec7 209->210 211 283feac-283feb2 209->211 211->210
                                  APIs
                                  • SetWindowLongW.USER32(?,?,?), ref: 0283FE9D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.517196290.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_2830000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: LongWindow
                                  • String ID: Qj:.
                                  • API String ID: 1378638983-4006226587
                                  • Opcode ID: 8cabac0b7b2460bde4eb7ac867fb9a9c3e43f19c91dc35a7c9d8d5cb004de1cc
                                  • Instruction ID: dc4df69a4e70ef50deaef771232a86dc2eb8e3a5fe9d3d96426ca1f86f6a49ec
                                  • Opcode Fuzzy Hash: 8cabac0b7b2460bde4eb7ac867fb9a9c3e43f19c91dc35a7c9d8d5cb004de1cc
                                  • Instruction Fuzzy Hash: 901112B98002088FDB10DF99D588BDFBBF8EB48324F10841AD919A7740C374A944CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000006.00000002.516614682.000000000263D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0263D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_263d000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4da414e4649d6fe15fb870971d4aca6d9b7d6ccb0d074dff3887a54bd2c16a31
                                  • Instruction ID: f8ebd5e3eff7f6bfde5d13bbdbbfb28833904e7df91db886fba6e0b1681b735a
                                  • Opcode Fuzzy Hash: 4da414e4649d6fe15fb870971d4aca6d9b7d6ccb0d074dff3887a54bd2c16a31
                                  • Instruction Fuzzy Hash: 6821F5B2504240EFDB16DF14D9C0B26BF66FB98338F24C569E9064B256C336D856CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000006.00000002.516614682.000000000263D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0263D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_263d000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 189dc29278aaaa362cf31fee783160b9d74652e96ce9f47db8a38a6de880f501
                                  • Instruction ID: a5d78e9b84e4fd42d676206d64f2b2e4fe26411ebd32f212479693a3a7e607ad
                                  • Opcode Fuzzy Hash: 189dc29278aaaa362cf31fee783160b9d74652e96ce9f47db8a38a6de880f501
                                  • Instruction Fuzzy Hash: 1921D7B2504240DFDB1ADF14D9C0B26BF65FB98324F24C5A9E9054B347C336E866C7A1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000006.00000002.516666279.000000000264D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0264D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_264d000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3a28234f2b76b8e20979133e16b4f99b71c0f398861c1c34eda96f3b0aaf961f
                                  • Instruction ID: 6d55019ac572d2ad7ab3555ea462c8500300e48e2088a179e758b0886fd67217
                                  • Opcode Fuzzy Hash: 3a28234f2b76b8e20979133e16b4f99b71c0f398861c1c34eda96f3b0aaf961f
                                  • Instruction Fuzzy Hash: 96213771904280DFDB14DF20D5C4B26BB61FB84714F24C5A9D8894B346CB37E857CA61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000006.00000002.516666279.000000000264D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0264D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_264d000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5b80e10669d27d35afa5fe984be4bf95cc26d6b3e9fdf16a8542b1c192d80bc5
                                  • Instruction ID: ee5e0bbb3c29dfca48629e125a92b68c13a3eff77a137826a9d6327f3f765cfb
                                  • Opcode Fuzzy Hash: 5b80e10669d27d35afa5fe984be4bf95cc26d6b3e9fdf16a8542b1c192d80bc5
                                  • Instruction Fuzzy Hash: D721A1755093C08FCB12CF20D994B15BF71EB46614F28C5EAD8898B697C33AD81ACB62
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000006.00000002.516614682.000000000263D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0263D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_263d000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d64477db9f9483eff024ad21beefddb018fc80a7aa46d68ce26437d5177f2104
                                  • Instruction ID: a013dbf230a46dc3b8467f86d68ebf978130dee63ae893cb256277772b1ec1b7
                                  • Opcode Fuzzy Hash: d64477db9f9483eff024ad21beefddb018fc80a7aa46d68ce26437d5177f2104
                                  • Instruction Fuzzy Hash: 1F118176504280DFCB16CF10D5C4B16BF71FB84324F28C6A9D8454B657C336E45ACBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000006.00000002.516614682.000000000263D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0263D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_263d000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d64477db9f9483eff024ad21beefddb018fc80a7aa46d68ce26437d5177f2104
                                  • Instruction ID: b93c6344d0bba7ed8047c714b407a905f220de8c106f591cf2946f714cbe1c67
                                  • Opcode Fuzzy Hash: d64477db9f9483eff024ad21beefddb018fc80a7aa46d68ce26437d5177f2104
                                  • Instruction Fuzzy Hash: 2511B176804280DFCB12CF14D5C4B16BF72FB84324F28C6A9D8050B616C336D45ACBA2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:14.1%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:27
                                  Total number of Limit Nodes:1
                                  execution_graph 15204 9297ba8 15205 9297bec ResumeThread 15204->15205 15207 9297c38 15205->15207 15220 9298188 15221 92981d4 ReadProcessMemory 15220->15221 15223 929824c 15221->15223 15228 9298418 15229 929849f CreateProcessA 15228->15229 15231 92986f4 15229->15231 15232 9297cc8 15233 9297d11 SetThreadContext 15232->15233 15235 9297d89 15233->15235 15208 4d5c050 15210 4d5c077 15208->15210 15209 4d5c154 15210->15209 15212 4d5bc88 15210->15212 15213 4d5d508 CreateActCtxA 15212->15213 15215 4d5d60e 15213->15215 15236 4d57e20 15237 4d57e6d VirtualProtect 15236->15237 15238 4d57ed9 15237->15238 15216 9297eb0 15217 9297ef4 VirtualAllocEx 15216->15217 15219 9297f6c 15217->15219 15224 9298000 15225 929804c WriteProcessMemory 15224->15225 15227 92980e5 15225->15227

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 143 7e0c080-7e0c0a1 144 7e0c0a3 143->144 145 7e0c0a8-7e0c19c 143->145 144->145 147 7e0c1a2-7e0c2f9 145->147 148 7e0c8a4-7e0c8cc 145->148 192 7e0c872-7e0c8a1 147->192 193 7e0c2ff-7e0c35a 147->193 151 7e0cfb5-7e0cfbe 148->151 153 7e0cfc4-7e0cfdb 151->153 154 7e0c8da-7e0c8e3 151->154 155 7e0c8e5 154->155 156 7e0c8ea-7e0c9de 154->156 155->156 175 7e0c9e0-7e0c9ec 156->175 176 7e0ca08 156->176 177 7e0c9f6-7e0c9fc 175->177 178 7e0c9ee-7e0c9f4 175->178 179 7e0ca0e-7e0ca2e 176->179 181 7e0ca06 177->181 178->181 183 7e0ca30-7e0ca89 179->183 184 7e0ca8e-7e0cb08 179->184 181->179 196 7e0cfb2 183->196 203 7e0cb0a-7e0cb5d 184->203 204 7e0cb5f-7e0cba2 184->204 192->148 199 7e0c35c 193->199 200 7e0c35f-7e0c36a 193->200 196->151 199->200 205 7e0c784-7e0c78a 200->205 233 7e0cbad-7e0cbb3 203->233 204->233 206 7e0c790-7e0c80d 205->206 207 7e0c36f-7e0c38d 205->207 250 7e0c85c-7e0c862 206->250 210 7e0c3e4-7e0c3f9 207->210 211 7e0c38f-7e0c393 207->211 215 7e0c400-7e0c416 210->215 216 7e0c3fb 210->216 211->210 213 7e0c395-7e0c3a0 211->213 220 7e0c3d6-7e0c3dc 213->220 217 7e0c418 215->217 218 7e0c41d-7e0c434 215->218 216->215 217->218 222 7e0c436 218->222 223 7e0c43b-7e0c451 218->223 225 7e0c3a2-7e0c3a6 220->225 226 7e0c3de-7e0c3df 220->226 222->223 230 7e0c453 223->230 231 7e0c458-7e0c45f 223->231 228 7e0c3a8 225->228 229 7e0c3ac-7e0c3c4 225->229 232 7e0c462-7e0c688 226->232 228->229 234 7e0c3c6 229->234 235 7e0c3cb-7e0c3d3 229->235 230->231 231->232 241 7e0c68a-7e0c68e 232->241 242 7e0c6ec-7e0c701 232->242 237 7e0cc0a-7e0cc16 233->237 234->235 235->220 238 7e0cbb5-7e0cbd7 237->238 239 7e0cc18-7e0cca0 237->239 244 7e0cbd9 238->244 245 7e0cbde-7e0cc07 238->245 274 7e0ce25-7e0ce2e 239->274 241->242 249 7e0c690-7e0c69f 241->249 246 7e0c703 242->246 247 7e0c708-7e0c729 242->247 244->245 245->237 246->247 254 7e0c730-7e0c74f 247->254 255 7e0c72b 247->255 256 7e0c6de-7e0c6e4 249->256 252 7e0c864-7e0c86a 250->252 253 7e0c80f-7e0c859 250->253 252->192 253->250 260 7e0c751 254->260 261 7e0c756-7e0c776 254->261 255->254 257 7e0c6a1-7e0c6a5 256->257 258 7e0c6e6-7e0c6e7 256->258 262 7e0c6a7-7e0c6ab 257->262 263 7e0c6af-7e0c6d0 257->263 268 7e0c781 258->268 260->261 265 7e0c778 261->265 266 7e0c77d 261->266 262->263 269 7e0c6d2 263->269 270 7e0c6d7-7e0c6db 263->270 265->266 266->268 268->205 269->270 270->256 276 7e0ce34-7e0ce8f 274->276 277 7e0cca5-7e0ccba 274->277 292 7e0ce91-7e0cec4 276->292 293 7e0cec6-7e0cef0 276->293 278 7e0ccc3-7e0ce19 277->278 279 7e0ccbc 277->279 297 7e0ce1f 278->297 279->278 280 7e0cd53-7e0cd93 279->280 281 7e0cd98-7e0cdd8 279->281 282 7e0ccc9-7e0cd09 279->282 283 7e0cd0e-7e0cd4e 279->283 280->297 281->297 282->297 283->297 301 7e0cef9-7e0cf8c 292->301 293->301 297->274 305 7e0cf93-7e0cfab 301->305 305->196
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: UUUU$hjFI
                                  • API String ID: 0-3356801800
                                  • Opcode ID: ef5a41a0ac021dd2cd35c4aa26558a53d6038bd1b30e5abff25dae7bc00183b0
                                  • Instruction ID: f1ca34975d65ce532cc4e385513e28e4433ecded5d2f2b601ee9e628b88656a1
                                  • Opcode Fuzzy Hash: ef5a41a0ac021dd2cd35c4aa26558a53d6038bd1b30e5abff25dae7bc00183b0
                                  • Instruction Fuzzy Hash: FFA2E575A01228CFDB64CF69C984AD9BBB2FF89304F1581E9D509AB361DB319E81CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 12c35be9c69adc084b7c4b0b22c3bec7a663bba9e07d91be11872545c77adb43
                                  • Instruction ID: 9ad250eb513db74770de9613e87c5149fd4bc7f97e32fc73c9c7feb801a13950
                                  • Opcode Fuzzy Hash: 12c35be9c69adc084b7c4b0b22c3bec7a663bba9e07d91be11872545c77adb43
                                  • Instruction Fuzzy Hash: A40250B0A01209DFCB15CFA8D984BAEBBB2FF49344F159065E805EB2A1D734DD81CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f49118c698a04e2f41ea8c1388d457e10dc06c24391a495901a4a343e93a3932
                                  • Instruction ID: 6f9130a2a232fa0ac49ce08f523207d47ad18347ea6f6105b8964fa91a9d2ce6
                                  • Opcode Fuzzy Hash: f49118c698a04e2f41ea8c1388d457e10dc06c24391a495901a4a343e93a3932
                                  • Instruction Fuzzy Hash: 506150B0A023098FDB44DF7AE441A99BBF2EBC4344F04C579D404EB268EB795815CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d0fb0203d824afc0f40403ad1a50304c258e2f1c3003457632b87b470716a454
                                  • Instruction ID: ebd6bbfc3f1962701e84bae520aac49e5bc5ca44b6f21cc224d9dca5da75f22b
                                  • Opcode Fuzzy Hash: d0fb0203d824afc0f40403ad1a50304c258e2f1c3003457632b87b470716a454
                                  • Instruction Fuzzy Hash: 076140B0A023098FDB48DF7AE841A9DBBF2EBC5348F04C57AD404EB264EB7959158F51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 931b018f18d00931dac125cad4df0af9de1e3b2e80c0d2ba2e22c4f24b3a24aa
                                  • Instruction ID: 0fb3b7b6702c22442e1dfe2f2e11ab651c5f512df8daed94c32e388779749846
                                  • Opcode Fuzzy Hash: 931b018f18d00931dac125cad4df0af9de1e3b2e80c0d2ba2e22c4f24b3a24aa
                                  • Instruction Fuzzy Hash: 0041BCB4D052489FDB10CFE9C684BDEFBF0AB0A318F20912AE514BB291D7759985CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 17ca86974ca8c676a1bc3aea914723190ac2f100f638831a7543cc3214514fcf
                                  • Instruction ID: c51bd335fb833f59f73b97042244485a67b98cc653ff1b89fc1507e0381e40b5
                                  • Opcode Fuzzy Hash: 17ca86974ca8c676a1bc3aea914723190ac2f100f638831a7543cc3214514fcf
                                  • Instruction Fuzzy Hash: 9A41ABB4D052489FDB10CFE9C584BDEBBF0AB0A318F20902AE515BB290D775A985CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1a27c6fffdd0ad27539ccbf436c218258124d279973380fb7b23539cc50df014
                                  • Instruction ID: be9b5d8f0601ae38998d5ac7f8fc17ab29a6ed9559d28daea4d464930866fe29
                                  • Opcode Fuzzy Hash: 1a27c6fffdd0ad27539ccbf436c218258124d279973380fb7b23539cc50df014
                                  • Instruction Fuzzy Hash: 6221E2B4D01249DFCB14DFAAC4446EDBBF1AB4A324F20E129E924B7390D7349981CF98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cb8c117f1129768bdab863fa2a32a70c926d8c7b23ffc396634c3d10548a1dad
                                  • Instruction ID: 46efa34c60445775a9e81fd61dc578885d32bf8313d9db6937aa2870bcec1736
                                  • Opcode Fuzzy Hash: cb8c117f1129768bdab863fa2a32a70c926d8c7b23ffc396634c3d10548a1dad
                                  • Instruction Fuzzy Hash: 6C2192B4D01209DFDB14DFAAC5446EDBBF2AB4A310F10E129E814B7290D7349991CF98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7959ceff93525bc27bc2ef505004a97b78802e42963f9a44b7d458e13d1c7845
                                  • Instruction ID: b53526f8683808afa61bacc5d3b3940d5d2499efee9bb2db7ee1b2d34ef55605
                                  • Opcode Fuzzy Hash: 7959ceff93525bc27bc2ef505004a97b78802e42963f9a44b7d458e13d1c7845
                                  • Instruction Fuzzy Hash: 5001F6B4D0524C9B8F04DFA9D5404EEFBF1AB5A310F10A02AE814B3310D3308952CFA8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                                  • Instruction ID: f6e82b68e468ca8880d8637cdcc79da2fdb29f5efa9f48f9c232c0b5ca42afc5
                                  • Opcode Fuzzy Hash: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                                  • Instruction Fuzzy Hash: D1F092B4D0520C9F8F04DFA9D5408EEFBF2AB5A310F10A12AE804B3310E73099518FA8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 306 9298418-92984b1 308 92984fa-9298522 306->308 309 92984b3-92984ca 306->309 313 9298568-92985be 308->313 314 9298524-9298538 308->314 309->308 312 92984cc-92984d1 309->312 315 92984d3-92984dd 312->315 316 92984f4-92984f7 312->316 322 92985c0-92985d4 313->322 323 9298604-92986f2 CreateProcessA 313->323 314->313 324 929853a-929853f 314->324 317 92984df 315->317 318 92984e1-92984f0 315->318 316->308 317->318 318->318 321 92984f2 318->321 321->316 322->323 332 92985d6-92985db 322->332 342 92986fb-92987e0 323->342 343 92986f4-92986fa 323->343 325 9298541-929854b 324->325 326 9298562-9298565 324->326 327 929854d 325->327 328 929854f-929855e 325->328 326->313 327->328 328->328 331 9298560 328->331 331->326 334 92985dd-92985e7 332->334 335 92985fe-9298601 332->335 336 92985e9 334->336 337 92985eb-92985fa 334->337 335->323 336->337 337->337 339 92985fc 337->339 339->335 355 92987f0-92987f4 342->355 356 92987e2-92987e6 342->356 343->342 358 9298804-9298808 355->358 359 92987f6-92987fa 355->359 356->355 357 92987e8 356->357 357->355 361 9298818-929881c 358->361 362 929880a-929880e 358->362 359->358 360 92987fc 359->360 360->358 364 929881e-9298847 361->364 365 9298852-929885d 361->365 362->361 363 9298810 362->363 363->361 364->365
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 092986DF
                                  Memory Dump Source
                                  • Source File: 00000013.00000002.419188687.0000000009290000.00000040.00000800.00020000.00000000.sdmp, Offset: 09290000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_9290000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 4cb6ab462a456f7769b886ae09bdd29a1a7b0fb94c13d2568ad88f5ad86d82e5
                                  • Instruction ID: 9e966490e277e06d5a80ad97496b1402dae36982e5879971765292da4e55a5df
                                  • Opcode Fuzzy Hash: 4cb6ab462a456f7769b886ae09bdd29a1a7b0fb94c13d2568ad88f5ad86d82e5
                                  • Instruction Fuzzy Hash: 5CC12571D142298FDF20CFA4C980BEEBBB1BF49304F0595A9E509B7240DB749A89CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 369 4d5bc88-4d5d60c CreateActCtxA 374 4d5d615-4d5d69a 369->374 375 4d5d60e-4d5d614 369->375 384 4d5d6c7-4d5d6cf 374->384 385 4d5d69c-4d5d6bf 374->385 375->374 385->384
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 04D5D5F9
                                  Memory Dump Source
                                  • Source File: 00000013.00000002.414465639.0000000004D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_4d50000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 4c1692b429f4fd5488baedf28b429b7338ac2ac64e64638b5939a644e447e449
                                  • Instruction ID: 38c25378c3b170c1b897469cc27b939771e65a2dfcd29855850d5c645597b800
                                  • Opcode Fuzzy Hash: 4c1692b429f4fd5488baedf28b429b7338ac2ac64e64638b5939a644e447e449
                                  • Instruction Fuzzy Hash: 9C51F4B1D0421CDFDB20DFA4C884BCEBBB5BF55308F1180A9D509AB251DB71AA89CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 389 9298000-929806b 391 929806d-929807f 389->391 392 9298082-92980e3 WriteProcessMemory 389->392 391->392 394 92980ec-929813e 392->394 395 92980e5-92980eb 392->395 395->394
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 092980D3
                                  Memory Dump Source
                                  • Source File: 00000013.00000002.419188687.0000000009290000.00000040.00000800.00020000.00000000.sdmp, Offset: 09290000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_9290000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 1bf6340df6c99ff1bb370f861008144c81ef7df242ee04188e8aa7f495031913
                                  • Instruction ID: 628f80b2e90032ab0d037e1233b079e700746c35af41158229c583affd94ea1f
                                  • Opcode Fuzzy Hash: 1bf6340df6c99ff1bb370f861008144c81ef7df242ee04188e8aa7f495031913
                                  • Instruction Fuzzy Hash: 2A41B8B5D012589FCF00CFA9D984AEEFBF1BB49314F14942AE818B7200D775AA45CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 400 9298188-929824a ReadProcessMemory 403 929824c-9298252 400->403 404 9298253-92982a5 400->404 403->404
                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0929823A
                                  Memory Dump Source
                                  • Source File: 00000013.00000002.419188687.0000000009290000.00000040.00000800.00020000.00000000.sdmp, Offset: 09290000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_9290000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: e91bb6c5e2a1476b3a9ad26d81dd538df303c0f95721aeb4d7638830905457de
                                  • Instruction ID: b3c896bfa4703c299defc94dfae4395ae8205d172bc0a4eb27ff4f8814b168ed
                                  • Opcode Fuzzy Hash: e91bb6c5e2a1476b3a9ad26d81dd538df303c0f95721aeb4d7638830905457de
                                  • Instruction Fuzzy Hash: FA41C8B4D042589FCF00CFAAD984AEEFBB1BF09314F14942AE914B7200C735A946CF68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 409 9297eb0-9297f6a VirtualAllocEx 412 9297f6c-9297f72 409->412 413 9297f73-9297fbd 409->413 412->413
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 09297F5A
                                  Memory Dump Source
                                  • Source File: 00000013.00000002.419188687.0000000009290000.00000040.00000800.00020000.00000000.sdmp, Offset: 09290000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_9290000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: fa80bf83313489018d9db0ca4206c7e0363368f7693c82e12f5dfe056609d6f4
                                  • Instruction ID: c019a67d8da399d941d0cd3beb3785cb8fa787d445fa39ae5d8c2ed2542c2910
                                  • Opcode Fuzzy Hash: fa80bf83313489018d9db0ca4206c7e0363368f7693c82e12f5dfe056609d6f4
                                  • Instruction Fuzzy Hash: 5931C8B4D142589FCF10CFA9D984ADEFBB5BB49310F10942AE815B7300D735A946CF68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 418 4d57e18-4d57ed7 VirtualProtect 421 4d57ee0-4d57f1c 418->421 422 4d57ed9-4d57edf 418->422 422->421
                                  APIs
                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 04D57EC7
                                  Memory Dump Source
                                  • Source File: 00000013.00000002.414465639.0000000004D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_4d50000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: 530ec3062043b8d70128b6b452596b7c6af8be673e467cfafa300216d32575a2
                                  • Instruction ID: 5bf1dc816264ce84e978e34aebfa3764f00377a178f6c3fe2f185439b11ecddc
                                  • Opcode Fuzzy Hash: 530ec3062043b8d70128b6b452596b7c6af8be673e467cfafa300216d32575a2
                                  • Instruction Fuzzy Hash: 1D3199B9D042589FCF10CFA9E484ADEFBB1BB09314F24902AE815B7310D735A945CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 425 4d57e20-4d57ed7 VirtualProtect 427 4d57ee0-4d57f1c 425->427 428 4d57ed9-4d57edf 425->428 428->427
                                  APIs
                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 04D57EC7
                                  Memory Dump Source
                                  • Source File: 00000013.00000002.414465639.0000000004D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_4d50000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: e9ddd8515e1857a4b00eb2b4a8acc7d0a3a97ed5c6a8997424511786e0af844a
                                  • Instruction ID: 003c2a152712b9a12a913eaa7415f020e3588c8dfb84acce9dbfb69199d917a2
                                  • Opcode Fuzzy Hash: e9ddd8515e1857a4b00eb2b4a8acc7d0a3a97ed5c6a8997424511786e0af844a
                                  • Instruction Fuzzy Hash: CD3198B9D042589FCF10CFA9E484AEEFBB1BB09310F24902AE814B7310D735A945CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 431 9297cc8-9297d28 433 9297d2a-9297d3c 431->433 434 9297d3f-9297d87 SetThreadContext 431->434 433->434 436 9297d89-9297d8f 434->436 437 9297d90-9297ddc 434->437 436->437
                                  APIs
                                  • SetThreadContext.KERNELBASE(?,?), ref: 09297D77
                                  Memory Dump Source
                                  • Source File: 00000013.00000002.419188687.0000000009290000.00000040.00000800.00020000.00000000.sdmp, Offset: 09290000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_9290000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: ContextThread
                                  • String ID:
                                  • API String ID: 1591575202-0
                                  • Opcode ID: f01fd5cd5627b05e9f3516914c30ffa1712189397e4e07adbffdfff9b5a1ab50
                                  • Instruction ID: 58027df10fdb6b6a0e7cf94df79cc00bb7d5cf850dea806a8bcf35672ad69514
                                  • Opcode Fuzzy Hash: f01fd5cd5627b05e9f3516914c30ffa1712189397e4e07adbffdfff9b5a1ab50
                                  • Instruction Fuzzy Hash: 6C31BBB5D102589FCF10DFA9D984AEEBBF5BF48314F14842AE418B7240D778A985CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 442 9297ba8-9297c36 ResumeThread 445 9297c38-9297c3e 442->445 446 9297c3f-9297c81 442->446 445->446
                                  APIs
                                  • ResumeThread.KERNELBASE(?), ref: 09297C26
                                  Memory Dump Source
                                  • Source File: 00000013.00000002.419188687.0000000009290000.00000040.00000800.00020000.00000000.sdmp, Offset: 09290000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_9290000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 5f7457cb65213983e2f8b53e8b5f4936cf9a6c7412e6bec9b33b6ac508034061
                                  • Instruction ID: 2178672e995137aae29658078587fb1433ffcda04850ef6e3cd1ccde27c4d8bf
                                  • Opcode Fuzzy Hash: 5f7457cb65213983e2f8b53e8b5f4936cf9a6c7412e6bec9b33b6ac508034061
                                  • Instruction Fuzzy Hash: A931A8B4D142189FCF10CFA9D984AEEFBB5AB49324F14942AE815B7300C775A945CFA8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e2019929dd3ef46a93864dad113669dd14b9b04fe1561c295d02b30469ef676e
                                  • Instruction ID: e5067b4cc1fd793e7b07faae0c3b5e4e1d323ad22a4966c30b14da00ea0b8247
                                  • Opcode Fuzzy Hash: e2019929dd3ef46a93864dad113669dd14b9b04fe1561c295d02b30469ef676e
                                  • Instruction Fuzzy Hash: 36F152B6A016158FCB15CF68C48899DBBF6FF88354B1A8095E515EB3B1DB34EC81CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4dee84311bac41804efe60965f19b9b9b1097318e83cebd34a9c37e04c2f4841
                                  • Instruction ID: ce75a0107df4be7cc349b5f79daf91ce6dc1ab5a88566cb4a798ddac30f3c199
                                  • Opcode Fuzzy Hash: 4dee84311bac41804efe60965f19b9b9b1097318e83cebd34a9c37e04c2f4841
                                  • Instruction Fuzzy Hash: AF0248B060120ACFDB14CFA8C584AAEBBB6FF49314F159959E405EB2D1C734E8D1CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4fb1b190d8111cab4d11a8496f118b37528d03ec9c5d24056338ffb0efd5fcb9
                                  • Instruction ID: 5de42b97f4458ab152a69e44e0f128f7f5cabadc48c4d640f1b3f31eb7cd28c4
                                  • Opcode Fuzzy Hash: 4fb1b190d8111cab4d11a8496f118b37528d03ec9c5d24056338ffb0efd5fcb9
                                  • Instruction Fuzzy Hash: 076192B431610A8FD714CF79EC8496E7BE9EF867547095479E406CF2A1EB34DC808B90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bad28e3cc4c1185480c9274e10242632bd285416670adae95669f422cc6261dd
                                  • Instruction ID: 0d6b1fc83ab38dab7f4a0b9f30a80f70100e56f035f664f3e7d9ff5696035324
                                  • Opcode Fuzzy Hash: bad28e3cc4c1185480c9274e10242632bd285416670adae95669f422cc6261dd
                                  • Instruction Fuzzy Hash: 196125B43052458FDB258B34D85CABD7BFABB85254B198469E216DB7C1DF24CCC087E1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 678c9b6920453d81de2d3985ea796130977cd72fb016321ab316af3702e76b69
                                  • Instruction ID: 678606ffebc6c9c7ccdb79f4c27b59e953599352ef174e1cf5e285d1e2ad0bf3
                                  • Opcode Fuzzy Hash: 678c9b6920453d81de2d3985ea796130977cd72fb016321ab316af3702e76b69
                                  • Instruction Fuzzy Hash: 0381B0F0A06216CFC704CF68C454BAEBBB1EB41328F189266E0659B3D9D735D9B1C791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0c56d2f71393074a47494a0d350ba75206e3fcb499432f0c101e94f0a93c5784
                                  • Instruction ID: 0de360853fb2256b9a4d37a2654cccb0b6c60ce3027f734b4b32fbb49c981a8b
                                  • Opcode Fuzzy Hash: 0c56d2f71393074a47494a0d350ba75206e3fcb499432f0c101e94f0a93c5784
                                  • Instruction Fuzzy Hash: 7171DAB0B02244CBDB14CBA8C815EAEBBB7EB45315F049126E555EB3E4C730D8928F91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f65f51bd635fcd891b4c9c5db1401ec1a33559a003a8067531d8f73d17f2bdbd
                                  • Instruction ID: c6255f662713b5c434a3249bf8e12e974bceecfc43121bbfd15649d3fdb7d6f9
                                  • Opcode Fuzzy Hash: f65f51bd635fcd891b4c9c5db1401ec1a33559a003a8067531d8f73d17f2bdbd
                                  • Instruction Fuzzy Hash: EC7109B1B022448BDB14CBA8C855EEEBBB7EF85315F049126E455EB3E4C730D8928F91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2e9f545e780f24f055e8927e3ba84bc392d0145997e9fd90a3c28e9928c7f1bd
                                  • Instruction ID: 1611ebc9b5215e78081b03835ae108e399e7ad44d30220d7ff7e908993145005
                                  • Opcode Fuzzy Hash: 2e9f545e780f24f055e8927e3ba84bc392d0145997e9fd90a3c28e9928c7f1bd
                                  • Instruction Fuzzy Hash: 6A4165B4600219CFCB149F69D888AAE7BB6FB49314F115069F9168B3B0DB74DC90CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9fa10aae764f5df5d27d2f26411929ec1a575fa65ef1d11fd9958f01b88754c5
                                  • Instruction ID: 63cea148d7b78f056fcb09c336a9200a0a071dbf652726c407e641a5853894a3
                                  • Opcode Fuzzy Hash: 9fa10aae764f5df5d27d2f26411929ec1a575fa65ef1d11fd9958f01b88754c5
                                  • Instruction Fuzzy Hash: FF416AB4A0A218DFDB50DF64D844BADB7B6FB49301F40C0A9D809A7784DB389E95CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c9588eab0023e67228d7ecb427f6094c714109c30960e94867cd44d64a91fe7
                                  • Instruction ID: 86ceb524e3051865c54f5d2685d84f1147307eb3317aff768d988ff2dc6424fa
                                  • Opcode Fuzzy Hash: 3c9588eab0023e67228d7ecb427f6094c714109c30960e94867cd44d64a91fe7
                                  • Instruction Fuzzy Hash: 7331A8B0A16316CBC7248FAAC5501BBB7F1EB46615F14563FE156DA2C0E334D9C1C7A1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e1e7fab591611513fadd8767ea8742b0160e39fcee99266414ccb6f9e4f717a9
                                  • Instruction ID: 363a407ae7aaedb4030942f6366c49c6ee8f717e85e3a63877114a7820436f39
                                  • Opcode Fuzzy Hash: e1e7fab591611513fadd8767ea8742b0160e39fcee99266414ccb6f9e4f717a9
                                  • Instruction Fuzzy Hash: 70315BB0A16105CFCB108F68D8C45FABBB5EF5A334F19A1A6D411DB2D1C234E9C2C791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 62ff851303797d1a54ca6936250aee6bb21296b62aad204e83a01aabfb92d738
                                  • Instruction ID: b95a28dde8bd6a92291fd42681902dab7d7d65d9cbe83a3c7e8cc0b5b75703c2
                                  • Opcode Fuzzy Hash: 62ff851303797d1a54ca6936250aee6bb21296b62aad204e83a01aabfb92d738
                                  • Instruction Fuzzy Hash: D731E6715093859FCB22CB64C804BEA7FB1FB06368F0995ABD0598B192D3399DC5CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 95ec6532e4aece5bb473b76725ada20c2774f90a1a42170adbc035f32abeebbc
                                  • Instruction ID: 12051ccd898bb39ae2ac042d528e6dbbae8c620e535a07266443b22d13c8b126
                                  • Opcode Fuzzy Hash: 95ec6532e4aece5bb473b76725ada20c2774f90a1a42170adbc035f32abeebbc
                                  • Instruction Fuzzy Hash: 2C3126B0A1A109CFCB108F68D8845FAF7B0EB4A320F15A5ABD456D72D0C334E9C2C791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8c52399b91ca8703742a6d00ac29e50a91052d0af7ee8f2e5b771c64a8d10949
                                  • Instruction ID: 6b2333fbb17aaf36c231b411b43a855a7b0e46d552346e9468e62ac747c7d185
                                  • Opcode Fuzzy Hash: 8c52399b91ca8703742a6d00ac29e50a91052d0af7ee8f2e5b771c64a8d10949
                                  • Instruction Fuzzy Hash: AD315EB1A016068FCB14CF68C8889AEBBF6FF89364B158155E515973A5DB30DC528BE0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ece40169e03843486339ff5c81dd60a774fff30f937c3c62e514dfea19e1cc00
                                  • Instruction ID: 9f8bb073153da739f08775485eb7865c3aea220470e4ab5435d151fcb8881994
                                  • Opcode Fuzzy Hash: ece40169e03843486339ff5c81dd60a774fff30f937c3c62e514dfea19e1cc00
                                  • Instruction Fuzzy Hash: 5B21F3B130534A4BDB251635885497E36969FC269D708903DE802CF7D5EA34CCC1C3E2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5c5993f3276ad83937ff25f367c5bd8e33d3b92eaf27b32ac4fcdeba16cd1c7c
                                  • Instruction ID: 46620cf53102a0efb6bf77443bfb991639e0460167a43c315c169c5f497584fd
                                  • Opcode Fuzzy Hash: 5c5993f3276ad83937ff25f367c5bd8e33d3b92eaf27b32ac4fcdeba16cd1c7c
                                  • Instruction Fuzzy Hash: C431E1B161E246CBCB108B7984802BDB7B2FB86315F19E1AFD0758A6D5CA38C9C0C791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c827ee4a5d2dede95a4d39b362bcf17c541852fb1b96237719c4bf6bcfc214cf
                                  • Instruction ID: 17acbb2e04a133bec05403895851775f7fa2826a20b4356d6320a62d00590e26
                                  • Opcode Fuzzy Hash: c827ee4a5d2dede95a4d39b362bcf17c541852fb1b96237719c4bf6bcfc214cf
                                  • Instruction Fuzzy Hash: B621B0B570120A4BEB251625885467E32979FC675DF189039E402CFBD4EE39CCC283E2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bb47b9a96ddd17385924d5c2ed6b305289ce05a1545a238224c8abe4a1aa5661
                                  • Instruction ID: e0d2bd1cbb3d74978094e19574189abda76b4be2215a4c581d767d407c02bc8c
                                  • Opcode Fuzzy Hash: bb47b9a96ddd17385924d5c2ed6b305289ce05a1545a238224c8abe4a1aa5661
                                  • Instruction Fuzzy Hash: D721C3F1A0A205CBD7108F69D8463EABBB4EB46310F58512BD516CA6C4D734D9E487E2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 45fb92d29be650e9ef5df6de2903f21c5b88f2f9bace76c97e8af58b3764523e
                                  • Instruction ID: b4d5d44125cca6c3f3bc377bb24ca6a5419fe3cdc6a0ce6a2e023fdd39228132
                                  • Opcode Fuzzy Hash: 45fb92d29be650e9ef5df6de2903f21c5b88f2f9bace76c97e8af58b3764523e
                                  • Instruction Fuzzy Hash: F3210FF1A0620ACBDB108FA9C4863EAB7B0EB45314F48903AD516CB6C4D734D8E9C7E1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.384039759.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_dcd000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 52b1eeddf647ccc2363c3415c57acccf75bdb0c541e630d0c8c1b1a34cbf362a
                                  • Instruction ID: da38285295460db2d3876f8adf25e4af3e7704badde6261fdc830b1f2acbf8bd
                                  • Opcode Fuzzy Hash: 52b1eeddf647ccc2363c3415c57acccf75bdb0c541e630d0c8c1b1a34cbf362a
                                  • Instruction Fuzzy Hash: E621FFB2518241DFCB05DF14D9C0F2ABB66FB98328F2885BDE9454B246C336D856CAB1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.384060463.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_ddd000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 197cb8222d05a884d29c6e7668ceaae6fa76238a728025f063bf7aca99c11b49
                                  • Instruction ID: fb597026ee33a3d8e59c269bfeddc2443a0b2dd9b8ff6f4536c6fa3184db46b5
                                  • Opcode Fuzzy Hash: 197cb8222d05a884d29c6e7668ceaae6fa76238a728025f063bf7aca99c11b49
                                  • Instruction Fuzzy Hash: 8A21B0B5508240DFDF14DF24D9C4B26BB66EB88314F28C5AAE9494B346C336D85BCA71
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.384060463.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_ddd000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e6630c20d043714b1019a437c84d6401b41e9339b93493307ed7f887cf9016ea
                                  • Instruction ID: aed584ba971be8e9fb6591fa839fcbb5cfa6c287c8b46155ba4dd7f2270de528
                                  • Opcode Fuzzy Hash: e6630c20d043714b1019a437c84d6401b41e9339b93493307ed7f887cf9016ea
                                  • Instruction Fuzzy Hash: 062104B1508240EFDF11DF60D9C0B26BFA6FB88318F24C5AAE9494B346C336D856CA71
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 64f2380dcbe491abe9c77288b42127f3c501a898100fbd4c0b32d0e0db1f2137
                                  • Instruction ID: bc5d892762de90915002af107909defb088040d81fd0d4cd13271005bb99ae3a
                                  • Opcode Fuzzy Hash: 64f2380dcbe491abe9c77288b42127f3c501a898100fbd4c0b32d0e0db1f2137
                                  • Instruction Fuzzy Hash: 6B315CB4A06209CFDB54DFA4D854AEDBBB5FB49305F0180A9D909E7744DB389D81CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6e872d28dfef4797b2e31c000be4f2d8416684f697bdbf35651399e443672ad0
                                  • Instruction ID: c67706570ce6f673c45556c0c1616220462f27ca35fb66b856b234737d92aa19
                                  • Opcode Fuzzy Hash: 6e872d28dfef4797b2e31c000be4f2d8416684f697bdbf35651399e443672ad0
                                  • Instruction Fuzzy Hash: 1E1104B1A053865BCB11DB799C449BFBBF6EBC62607144529E518D72C0EF30894587E1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.384060463.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_ddd000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 449afd37c93d8a8d7338991338e37037e808d8bf65385ebaa785a3b4ab3fc49a
                                  • Instruction ID: 9eeb45875a370755a3827f79cf77df91042f57f089c5dbbb7297402e9d83a68e
                                  • Opcode Fuzzy Hash: 449afd37c93d8a8d7338991338e37037e808d8bf65385ebaa785a3b4ab3fc49a
                                  • Instruction Fuzzy Hash: C02180755093C08FCB12CF24D994715BF71EB86314F29C5EBD8498B697C33A980ACB62
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 013e4346bf39172c9fc206fe465d29936da942f034372b88e5d59129bad5b0c5
                                  • Instruction ID: b6e9a0e16c2f6e59ccd2bcde792f89873cf432731b74e31636cc40295639cb8d
                                  • Opcode Fuzzy Hash: 013e4346bf39172c9fc206fe465d29936da942f034372b88e5d59129bad5b0c5
                                  • Instruction Fuzzy Hash: C411C6B1A012465B8B10EB7D99449BFB6F6FBC52507504938E519D3380EF30DD0587E1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9552bf6a7575909f5c7cf5f96933909984831dfae42aab4104c489ea1c1339b2
                                  • Instruction ID: ef1df87fb064dbf68ad415899235f108025a421363d6b05447f149be2dfe0508
                                  • Opcode Fuzzy Hash: 9552bf6a7575909f5c7cf5f96933909984831dfae42aab4104c489ea1c1339b2
                                  • Instruction Fuzzy Hash: 95117371F052498BCB64EBB896105EEB7F6AF86714B100439D504EB780EB31CD96CBE1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.384039759.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_dcd000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d64477db9f9483eff024ad21beefddb018fc80a7aa46d68ce26437d5177f2104
                                  • Instruction ID: 34a0b754147cefd46282c229e3c5ba01e1200b51775d8cee04404fbabe96556a
                                  • Opcode Fuzzy Hash: d64477db9f9483eff024ad21beefddb018fc80a7aa46d68ce26437d5177f2104
                                  • Instruction Fuzzy Hash: F411B176404280CFCB11CF10D9C4B16BF72FB89324F28C6ADD8450B656C336D85ACBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8213a19f8a0274de238415d66961c69b1784556709eb93a436f13e44e0a4fab6
                                  • Instruction ID: 89e91da3a308b4a4a34a92d286a3a7ed924c38fb941053a2a694cdfb57bf86b8
                                  • Opcode Fuzzy Hash: 8213a19f8a0274de238415d66961c69b1784556709eb93a436f13e44e0a4fab6
                                  • Instruction Fuzzy Hash: 842141B4A092098FEB60DF64C455ADDBBB6FB88341F20C16AD809E7749DB389D41CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4ff7e4dafea29a026924cc979eb90c1139b0cdfbc7e1f8f8404b84ac9b3c92d7
                                  • Instruction ID: 8d4809b90bf004d7767947c40a9f87c8f637b3412e2e965df709825d177db291
                                  • Opcode Fuzzy Hash: 4ff7e4dafea29a026924cc979eb90c1139b0cdfbc7e1f8f8404b84ac9b3c92d7
                                  • Instruction Fuzzy Hash: A001A2B6B051155FC3109769E884CABBBE9EFC92393158166F648CB362D9218C82C7E0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.384060463.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_ddd000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7a673041faea760638411a329164a2550987f39295efeab768d269dd870a3f12
                                  • Instruction ID: d1436108c8c7bece729112c10933a71fff1a5076315bf4b7f26c2577a32eba18
                                  • Opcode Fuzzy Hash: 7a673041faea760638411a329164a2550987f39295efeab768d269dd870a3f12
                                  • Instruction Fuzzy Hash: 38117975904280DFCB11DF10D5C4B15BFB2FB84324F28C6AAD8494B756C33AD85ACB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0db64b0d86c260a57bf0de2b8426283e27ab38ef7a43e4797acd65fdffae45d3
                                  • Instruction ID: 4b3c0d538bfa3cefe999eb1f84fa88a21e6d38891bfbc39410a6eeb70c270a7b
                                  • Opcode Fuzzy Hash: 0db64b0d86c260a57bf0de2b8426283e27ab38ef7a43e4797acd65fdffae45d3
                                  • Instruction Fuzzy Hash: A9216DF4E1A2098FDB50CF98D880AECB7B5FB49309F0191A5D419A7384D738AE81CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 293c5345b191f340d965ca2402935433168595b0e22485fe1d9b307e5b4dea02
                                  • Instruction ID: c16c7ca09ecbc09c2df510463f83c6c974f2179a5f280d875ac9541c22a75728
                                  • Opcode Fuzzy Hash: 293c5345b191f340d965ca2402935433168595b0e22485fe1d9b307e5b4dea02
                                  • Instruction Fuzzy Hash: 88113DF4A091199FDB14CF98C854BEDB7B5FB49305F0081A6D909A7384DB385D828FA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 34f45ede5ed59ff1d92d5038af695677e9580473e378825606819d1c6103b478
                                  • Instruction ID: 242efd1cb3034f79d66293c432758be6b256fcfb0a0f681300d7b18a4a401eb4
                                  • Opcode Fuzzy Hash: 34f45ede5ed59ff1d92d5038af695677e9580473e378825606819d1c6103b478
                                  • Instruction Fuzzy Hash: 7C119DF4A092098FDB00DF58C455AED7BB5FB49304F008169E909E7785D738AD01CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.384039759.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_dcd000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0858e3cc29566f6946f7c299f12e46d7bff09ae1de9b4d1e5560ecad66797ef4
                                  • Instruction ID: 28b40eb9bf5d3bce40af0f307435eba369a7371ef999c79a19d96e978627e3ed
                                  • Opcode Fuzzy Hash: 0858e3cc29566f6946f7c299f12e46d7bff09ae1de9b4d1e5560ecad66797ef4
                                  • Instruction Fuzzy Hash: BC01F7710083849AEB109E25CDC4F66BB99DF41368F1CC56EE9065B2C6D379D841CAB1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.384039759.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_dcd000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d826591863548189556709e51af4834ff558334f762f285623e4666e0cdb6da0
                                  • Instruction ID: 847803bdcd68b029a768901206d1ff810826ba1bf7701342a45e0aa6246d8914
                                  • Opcode Fuzzy Hash: d826591863548189556709e51af4834ff558334f762f285623e4666e0cdb6da0
                                  • Instruction Fuzzy Hash: C2F06271408284AAEB108E15CCC8B62FFA8EB91774F1CC55EED095B286C3799C44CAB1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 03b357537d0b7b382177efec04a47c661b3821c32bc01d614144dff38340a03a
                                  • Instruction ID: 6fa978b22215f67023e61aaee65693b611049e82ff6f08126ac4126679757851
                                  • Opcode Fuzzy Hash: 03b357537d0b7b382177efec04a47c661b3821c32bc01d614144dff38340a03a
                                  • Instruction Fuzzy Hash: C7011AB4A09219CFDB50DFA8D84479C77B1EB88341F50C2AAD80DA3744DB385E95CF60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e8bf24109a7044dbd3c8c00b7310586b447a7692da1621a9a753c95890d0fcb5
                                  • Instruction ID: 79ac203b94d7fa75717af6ed7d26a92247c57a1b765fdd176f9ef1d20e9f9b42
                                  • Opcode Fuzzy Hash: e8bf24109a7044dbd3c8c00b7310586b447a7692da1621a9a753c95890d0fcb5
                                  • Instruction Fuzzy Hash: 50F0C2F240E3C99FC7028B7499543A97FB4AB03245F0941E7D5889B457DA201E90CBE2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6d99f27862429eec7ee9d6c2a8774b481297247105eeb8ab54f9bd93d640ede2
                                  • Instruction ID: 076a85a1f449ab20badf59d626f59264b17177493653d42f8cfb5ed013158a5b
                                  • Opcode Fuzzy Hash: 6d99f27862429eec7ee9d6c2a8774b481297247105eeb8ab54f9bd93d640ede2
                                  • Instruction Fuzzy Hash: A3E03976B041246F5314DA6AD884C6BFBEEEBCD664351813AF908C7320DA319C0186A0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 20656f421e656a7fbc64e6dd0bc41a49f566d0c8567a0a2dde13298c541f65ba
                                  • Instruction ID: 1e26fe81cc559267caa96eff70af93029ccd70d1a1fb754bea823945a0fa6f6d
                                  • Opcode Fuzzy Hash: 20656f421e656a7fbc64e6dd0bc41a49f566d0c8567a0a2dde13298c541f65ba
                                  • Instruction Fuzzy Hash: 66F04FB4A1A2198FDB40DF98C440ADD77B5FB84345F0084799409E7744DB38AE41CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f9938070c158e2883b26a17ca03782a6ad56bb165e7f381ac846de0b64e02ef0
                                  • Instruction ID: 0a40fdcd2efa39f6ccba73e7ff4691ec6c2de67c61c7c17ebffb21a6c9af6e46
                                  • Opcode Fuzzy Hash: f9938070c158e2883b26a17ca03782a6ad56bb165e7f381ac846de0b64e02ef0
                                  • Instruction Fuzzy Hash: 84F0F8B4A09208AFCB40DFA8D481A58BBF0AB49204F1580EAD85897746DA35AA51DF81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e088fdb9d8ecf46566fbf42826b0b5c0ad14530fb3176f2bb31c587e590a4044
                                  • Instruction ID: f91d75baa1437b1572527458a6539f6d5215061183cac2d609a5b26112b4dd1a
                                  • Opcode Fuzzy Hash: e088fdb9d8ecf46566fbf42826b0b5c0ad14530fb3176f2bb31c587e590a4044
                                  • Instruction Fuzzy Hash: 0CF020F090A388AFCB10EB30AC5A75D7FB4A706384F0084ECD84483181EB7429A8CB12
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1d5c6c903abb89e416c7581d3e52ddeedba26754280cd33b589cee288f98d6ea
                                  • Instruction ID: 1ba08f57d57bb22d0216042880f69f16bc0f45cc4dce6270ffc80b790a483e3c
                                  • Opcode Fuzzy Hash: 1d5c6c903abb89e416c7581d3e52ddeedba26754280cd33b589cee288f98d6ea
                                  • Instruction Fuzzy Hash: 5DF034B4A06248CFCB50CF68C944A9DBBF5EB49301F5080E8D849A7745D738AD91CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 46569ebb1617ca5f911e4a7e7b5073e3da6a53a53ba12ad2bb1f7ada7c8890f3
                                  • Instruction ID: 06198a22703f3cde633945ae12f01e540de07d4c40d423e4c150f7c969f83d4b
                                  • Opcode Fuzzy Hash: 46569ebb1617ca5f911e4a7e7b5073e3da6a53a53ba12ad2bb1f7ada7c8890f3
                                  • Instruction Fuzzy Hash: 17E0DFB0A06349AFDF10DF74E94A72C7FA5A706348F0080ECD80893284EB352DA09761
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e1661f3f1b3b6586f674253bb7484fe1bc7f690b829c427086c7861cf2f0e7e2
                                  • Instruction ID: e1d93577f313875ca7fb08afca3dbcc728afcce1b2bc5c4dac473e91a04b2e45
                                  • Opcode Fuzzy Hash: e1661f3f1b3b6586f674253bb7484fe1bc7f690b829c427086c7861cf2f0e7e2
                                  • Instruction Fuzzy Hash: E0E07574E05208AFCB44DFA8D58569DBBF5EB48304F14C1AA981897344EB35AA52DF81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ffec71be6c4bce6adb3c17d65e92491be87e259418307ee5e2f358f5e933e0e6
                                  • Instruction ID: 27b567ddc8da3366438982f19f5fb191fb549ba699604c3f025ed8840a3ba803
                                  • Opcode Fuzzy Hash: ffec71be6c4bce6adb3c17d65e92491be87e259418307ee5e2f358f5e933e0e6
                                  • Instruction Fuzzy Hash: CAD0C2B180530CEBCB00DFB0E54565E7BB8EB05244F0040A6E50983110FF311E509BA2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5e48212b43fcf88a2ebf11767638c49f29e26fe9ab24b05e2a5fb6ae8bc4398f
                                  • Instruction ID: 466ef4bbd66c54d4e2ceca6334dbb4248785f6cb1b97ab566fb09c216737b150
                                  • Opcode Fuzzy Hash: 5e48212b43fcf88a2ebf11767638c49f29e26fe9ab24b05e2a5fb6ae8bc4398f
                                  • Instruction Fuzzy Hash: 7F31D5B4D01249EFDB14CFA9D5849EDBBF1BB4A310F24A22AE914B7390D7309981CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000013.00000002.418717546.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_7e00000_U7Ncg7oAyC.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d934017556483ee88eb1ebfcf3513123765c03871fac230ce1520d09e5d857f2
                                  • Instruction ID: 6c9fa8f4a896e58e80e583dc4e2b70ed64a7e2fa29fed7bcca8c0789718aa1cb
                                  • Opcode Fuzzy Hash: d934017556483ee88eb1ebfcf3513123765c03871fac230ce1520d09e5d857f2
                                  • Instruction Fuzzy Hash: C8316FB4D05209EFDB14CFA9D584AEDBBF1BB4A350F24A12AE814B7390D7349981CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:16.1%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:35
                                  Total number of Limit Nodes:3
                                  execution_graph 9183 9b48000 9184 9b4804c WriteProcessMemory 9183->9184 9186 9b480e5 9184->9186 9172 5718658 9173 57187e3 9172->9173 9175 571867e 9172->9175 9175->9173 9176 5718244 9175->9176 9177 5718930 PostMessageW 9176->9177 9178 57189dd 9177->9178 9178->9175 9187 5718048 9188 571805d 9187->9188 9191 9b47eb0 9188->9191 9192 9b47ef4 VirtualAllocEx 9191->9192 9194 571807c 9192->9194 9160 15ac050 9162 15ac077 9160->9162 9161 15ac154 9162->9161 9164 15abc88 9162->9164 9165 15ad508 CreateActCtxA 9164->9165 9167 15ad60e 9165->9167 9195 15a7e20 9196 15a7e6d VirtualProtect 9195->9196 9197 15a7ed9 9196->9197 9168 9b47ba8 9169 9b47bec ResumeThread 9168->9169 9171 9b47c38 9169->9171 9179 9b48418 9180 9b4849f CreateProcessA 9179->9180 9182 9b486f4 9180->9182 9198 9b48188 9199 9b481d4 ReadProcessMemory 9198->9199 9201 9b4824c 9199->9201 9202 9b47cc8 9203 9b47d11 SetThreadContext 9202->9203 9205 9b47d89 9203->9205

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 216 9b48418-9b484b1 218 9b484b3-9b484ca 216->218 219 9b484fa-9b48522 216->219 218->219 224 9b484cc-9b484d1 218->224 222 9b48524-9b48538 219->222 223 9b48568-9b485be 219->223 222->223 231 9b4853a-9b4853f 222->231 233 9b48604-9b486f2 CreateProcessA 223->233 234 9b485c0-9b485d4 223->234 225 9b484f4-9b484f7 224->225 226 9b484d3-9b484dd 224->226 225->219 228 9b484e1-9b484f0 226->228 229 9b484df 226->229 228->228 232 9b484f2 228->232 229->228 235 9b48541-9b4854b 231->235 236 9b48562-9b48565 231->236 232->225 252 9b486f4-9b486fa 233->252 253 9b486fb-9b487e0 233->253 234->233 241 9b485d6-9b485db 234->241 238 9b4854d 235->238 239 9b4854f-9b4855e 235->239 236->223 238->239 239->239 242 9b48560 239->242 243 9b485dd-9b485e7 241->243 244 9b485fe-9b48601 241->244 242->236 246 9b485e9 243->246 247 9b485eb-9b485fa 243->247 244->233 246->247 247->247 248 9b485fc 247->248 248->244 252->253 265 9b487f0-9b487f4 253->265 266 9b487e2-9b487e6 253->266 268 9b48804-9b48808 265->268 269 9b487f6-9b487fa 265->269 266->265 267 9b487e8 266->267 267->265 270 9b48818-9b4881c 268->270 271 9b4880a-9b4880e 268->271 269->268 272 9b487fc 269->272 274 9b48852-9b4885d 270->274 275 9b4881e-9b48847 270->275 271->270 273 9b48810 271->273 272->268 273->270 275->274
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 09B486DF
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.422965447.0000000009B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09B40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_9b40000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 17ed489681599e0f168dee02a894a5e6fab15872ae33ec7bbc73e9dc8f3174bd
                                  • Instruction ID: eac0b4dc83cff8b670b934495683e4b9e3832d7d191cb50cb19054c9fff5187c
                                  • Opcode Fuzzy Hash: 17ed489681599e0f168dee02a894a5e6fab15872ae33ec7bbc73e9dc8f3174bd
                                  • Instruction Fuzzy Hash: 92C12571D042298FDB20CFA4C841BEEBBB1FF49314F0495A9E909B7240DB749A85EF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 279 15abc88-15ad60c CreateActCtxA 284 15ad60e-15ad614 279->284 285 15ad615-15ad69a 279->285 284->285 294 15ad69c-15ad6bf 285->294 295 15ad6c7-15ad6cf 285->295 294->295
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 015AD5F9
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.398758613.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_15a0000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 8466b956fed5e70cae3310e1f403f2ecdb007c480b3d520559c43994fd1223a8
                                  • Instruction ID: 5da99e45c2a3475cf38b0e6a6fa514e5b403e2c71c5b05c793883c8d34dd3884
                                  • Opcode Fuzzy Hash: 8466b956fed5e70cae3310e1f403f2ecdb007c480b3d520559c43994fd1223a8
                                  • Instruction Fuzzy Hash: BD51E2B1D0421C8FDB20DFA4C984BCEBBB5BF59308F1180A9D549BB251DB716A89CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 299 9b48000-9b4806b 301 9b48082-9b480e3 WriteProcessMemory 299->301 302 9b4806d-9b4807f 299->302 304 9b480e5-9b480eb 301->304 305 9b480ec-9b4813e 301->305 302->301 304->305
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09B480D3
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.422965447.0000000009B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09B40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_9b40000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 86ae0ca0bc68264d5a2c3ab6bf771a796eeaf2e02771e468e552bbd16d97bae4
                                  • Instruction ID: 21d5328c7fc02a8c1d636059d088b7a5a3ba95cf908d6a0cd7e5922e2a219816
                                  • Opcode Fuzzy Hash: 86ae0ca0bc68264d5a2c3ab6bf771a796eeaf2e02771e468e552bbd16d97bae4
                                  • Instruction Fuzzy Hash: B041B8B5D012589FCF00CFA9D984AEEFBF1BB49314F14942AE818BB200D735AA45DF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 310 9b48188-9b4824a ReadProcessMemory 313 9b48253-9b482a5 310->313 314 9b4824c-9b48252 310->314 314->313
                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09B4823A
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.422965447.0000000009B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09B40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_9b40000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: a22792098f19f56f08b84f226df411b1f5c65f433b74d077b7130e70b964b2c1
                                  • Instruction ID: 7427e00804705d53f5823bc9c9c0f29d1d694d1dab65ba23820af3aff3520d26
                                  • Opcode Fuzzy Hash: a22792098f19f56f08b84f226df411b1f5c65f433b74d077b7130e70b964b2c1
                                  • Instruction Fuzzy Hash: 0441A6B5D042589FCF00CFEAD884AEEFBB1BB59324F14942AE914B7200D735A945DFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 319 9b47eb0-9b47f6a VirtualAllocEx 322 9b47f73-9b47fbd 319->322 323 9b47f6c-9b47f72 319->323 323->322
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 09B47F5A
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.422965447.0000000009B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09B40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_9b40000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 4ad35f8ccec913b622999b5d0ca2792ead37344ca550172f10923f9dc5e52e42
                                  • Instruction ID: 5d832459a3672e357e239a2763b0fdd816da6564c46b58c832dc1c07ebf624f4
                                  • Opcode Fuzzy Hash: 4ad35f8ccec913b622999b5d0ca2792ead37344ca550172f10923f9dc5e52e42
                                  • Instruction Fuzzy Hash: 2A31A7B9D042589FCF10CFA9D984ADEFBB1BB49320F14942AE815BB300D735A945DFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 328 15a7e18-15a7ed7 VirtualProtect 330 15a7ed9-15a7edf 328->330 331 15a7ee0-15a7f1c 328->331 330->331
                                  APIs
                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 015A7EC7
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.398758613.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_15a0000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: baae998bb3e64d609d2c5714bff1d2817510dc172cec5e5fd10e9295452a87c6
                                  • Instruction ID: 8280c1ce2722f60f456a7da1ef18e09dba0b052d48cba1d8b8a13b8beebfe6f4
                                  • Opcode Fuzzy Hash: baae998bb3e64d609d2c5714bff1d2817510dc172cec5e5fd10e9295452a87c6
                                  • Instruction Fuzzy Hash: 913188B9D042589FCF10CFA9E584AEEFBB1BB09310F14942AE854B7210D735A945CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 334 15a7e20-15a7ed7 VirtualProtect 336 15a7ed9-15a7edf 334->336 337 15a7ee0-15a7f1c 334->337 336->337
                                  APIs
                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 015A7EC7
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.398758613.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_15a0000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: 7e7a08b019c075c31ea0c3dce7443b307f7918bf90050fa66f8c4de078b03eb5
                                  • Instruction ID: 9da3e3c6b0fd8d812877dd287328f982521e7f638c93a6e87898c6c89a113db7
                                  • Opcode Fuzzy Hash: 7e7a08b019c075c31ea0c3dce7443b307f7918bf90050fa66f8c4de078b03eb5
                                  • Instruction Fuzzy Hash: C93197B9D042589FCB10CFA9E484AEEFBB4BB09310F14942AE814B7210D735A945CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 340 9b47cc8-9b47d28 342 9b47d3f-9b47d87 SetThreadContext 340->342 343 9b47d2a-9b47d3c 340->343 345 9b47d90-9b47ddc 342->345 346 9b47d89-9b47d8f 342->346 343->342 346->345
                                  APIs
                                  • SetThreadContext.KERNELBASE(?,?), ref: 09B47D77
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.422965447.0000000009B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09B40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_9b40000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: ContextThread
                                  • String ID:
                                  • API String ID: 1591575202-0
                                  • Opcode ID: a4cc58d2df5b0d25c0c453c84e09f1b6bb5cbcd6c5bb525bd85c7cf9338f03d2
                                  • Instruction ID: 1f0522572804cb6a9c6ebe63cc10128ce01fc60446c6925525ae0f8ad6355cc1
                                  • Opcode Fuzzy Hash: a4cc58d2df5b0d25c0c453c84e09f1b6bb5cbcd6c5bb525bd85c7cf9338f03d2
                                  • Instruction Fuzzy Hash: 0F31CDB5D002589FCB10DFA9D884AEEFBF1BF48324F14842AE414B7240D738A985DF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 351 5718244-57189db PostMessageW 353 57189e4-5718a16 351->353 354 57189dd-57189e3 351->354 354->353
                                  APIs
                                  • PostMessageW.USER32(?,?,?,00000000), ref: 057189CB
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.420207034.0000000005710000.00000040.00000800.00020000.00000000.sdmp, Offset: 05710000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_5710000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: 0f6763860721ebd1e42c50d8234d97e251dcad3d7ba4606564eb0aa2fe2ebdf9
                                  • Instruction ID: 28747fe432626c44c5e04c6233573ca91e06ee94f9a3adcc5957c83db0e39396
                                  • Opcode Fuzzy Hash: 0f6763860721ebd1e42c50d8234d97e251dcad3d7ba4606564eb0aa2fe2ebdf9
                                  • Instruction Fuzzy Hash: 8131A7B8D04208AFCB10CFA9D484ADEFBF4AB09310F14902AE815BB310D335A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 357 9b47ba8-9b47c36 ResumeThread 360 9b47c3f-9b47c81 357->360 361 9b47c38-9b47c3e 357->361 361->360
                                  APIs
                                  • ResumeThread.KERNELBASE(?), ref: 09B47C26
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.422965447.0000000009B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09B40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_9b40000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: e621569b3d77785a4245bda80395e6c9162dfd46c39ba6d811d1284f658f380b
                                  • Instruction ID: 25c55b5f2b393db15eb86063f5307cec9f3d01e44c01f411a761eff320737097
                                  • Opcode Fuzzy Hash: e621569b3d77785a4245bda80395e6c9162dfd46c39ba6d811d1284f658f380b
                                  • Instruction Fuzzy Hash: 4631AAB4D052189FCF10DFA9D984AEEFBB4AB49324F14942AE815B7300CB35A945CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:12.5%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:207
                                  Total number of Limit Nodes:15
                                  execution_graph 18581 4e11930 18583 4e11a28 2 API calls 18581->18583 18582 4e1193f 18583->18582 18584 4e14090 DuplicateHandle 18585 4e1416d 18584->18585 18445 266c050 18446 266c077 18445->18446 18447 266c154 18446->18447 18449 266bc88 18446->18449 18450 266d508 CreateActCtxA 18449->18450 18452 266d60e 18450->18452 18453 2667e20 18454 2667e6d VirtualProtect 18453->18454 18455 2667ed9 18454->18455 18586 266bd90 18587 266bda7 18586->18587 18588 266bde4 18587->18588 18590 266b558 18587->18590 18591 266b563 18590->18591 18594 266d1ec 18591->18594 18593 266e8c6 18593->18587 18595 266d1f7 18594->18595 18598 266d20c 18595->18598 18597 266eb0d 18597->18593 18599 266d217 18598->18599 18602 266d23c 18599->18602 18601 266ebe2 18601->18597 18603 266d247 18602->18603 18606 266d26c 18603->18606 18605 266ece2 18605->18601 18607 266d277 18606->18607 18608 266f3fe 18607->18608 18613 4e1ec00 18607->18613 18616 4e1f5a8 18607->18616 18619 4e1f599 18607->18619 18623 4e1ebf0 18607->18623 18608->18605 18614 4e11a28 2 API calls 18613->18614 18615 4e1ec0d 18614->18615 18615->18608 18617 4e11a28 2 API calls 18616->18617 18618 4e1f5b6 18617->18618 18618->18608 18620 4e1f5a5 18619->18620 18621 4e11a28 2 API calls 18620->18621 18622 4e1f5b6 18621->18622 18622->18608 18624 4e1ec00 18623->18624 18625 4e11a28 2 API calls 18624->18625 18626 4e1ec0d 18625->18626 18626->18608 18627 4e1e596 18639 4e1eb10 18627->18639 18643 4e1eaec 18627->18643 18628 4e1e5a8 18651 4e1ed70 18628->18651 18655 4e1ed61 18628->18655 18629 4e1e5d6 18636 4e1ed61 2 API calls 18629->18636 18637 4e1ed70 2 API calls 18629->18637 18630 4e1e604 18659 4e1fb18 18630->18659 18636->18630 18637->18630 18640 4e1eb27 18639->18640 18663 4e1d1e4 18640->18663 18642 4e1eb41 18642->18628 18644 4e1eaf0 18643->18644 18645 4e1eb02 18644->18645 18646 4e1eb5a 18644->18646 18647 4e1d1e4 2 API calls 18645->18647 18650 266d26c 2 API calls 18646->18650 18648 4e1eb41 18647->18648 18648->18628 18649 4e1eb78 18649->18628 18650->18649 18652 4e1ed87 18651->18652 18667 4e1d224 18652->18667 18654 4e1eda1 18654->18629 18656 4e1ed87 18655->18656 18657 4e1d224 2 API calls 18656->18657 18658 4e1eda1 18657->18658 18658->18629 18660 4e1fb2f 18659->18660 18671 4e1d264 18660->18671 18664 4e1d1ef 18663->18664 18665 4e1eb78 18664->18665 18666 266d26c 2 API calls 18664->18666 18665->18642 18666->18665 18668 4e1d22f 18667->18668 18670 266d26c 2 API calls 18668->18670 18669 4e1edcb 18669->18654 18670->18669 18672 4e1d26f 18671->18672 18675 4e1d274 18672->18675 18674 4e1e632 18676 4e1d27f 18675->18676 18678 266d26c 2 API calls 18676->18678 18677 4e1fefc 18677->18674 18678->18677 18422 4e13e68 GetCurrentProcess 18423 4e13ee2 GetCurrentThread 18422->18423 18424 4e13edb 18422->18424 18425 4e13f18 18423->18425 18426 4e13f1f GetCurrentProcess 18423->18426 18424->18423 18425->18426 18429 4e13f55 18426->18429 18427 4e13f7d GetCurrentThreadId 18428 4e13fae 18427->18428 18429->18427 18456 4e146a8 18457 4e146d0 18456->18457 18459 4e146f8 18457->18459 18460 4e138c4 18457->18460 18459->18459 18461 4e138cf 18460->18461 18465 4e164e8 18461->18465 18473 4e164e0 18461->18473 18462 4e147a0 18462->18459 18467 4e16519 18465->18467 18469 4e1660a 18465->18469 18466 4e16525 18466->18462 18467->18466 18481 4e169e8 18467->18481 18468 4e16565 18484 4e1739f 18468->18484 18488 4e173b0 18468->18488 18469->18462 18475 4e16519 18473->18475 18477 4e1660a 18473->18477 18474 4e16525 18474->18462 18475->18474 18480 4e169e8 2 API calls 18475->18480 18476 4e16565 18478 4e173b0 CreateWindowExW 18476->18478 18479 4e1739f CreateWindowExW 18476->18479 18477->18462 18478->18477 18479->18477 18480->18476 18492 4e11a28 18481->18492 18483 4e169f1 18483->18468 18485 4e173da 18484->18485 18486 4e17481 18485->18486 18512 4e184e0 18485->18512 18489 4e173da 18488->18489 18490 4e17481 18489->18490 18491 4e184e0 CreateWindowExW 18489->18491 18491->18490 18493 4e11a3b 18492->18493 18494 4e11a53 18493->18494 18500 4e11ce8 18493->18500 18504 4e11cf8 18493->18504 18494->18483 18495 4e11a4b 18495->18494 18496 4e11c6d GetModuleHandleW 18495->18496 18497 4e11cac 18496->18497 18497->18483 18501 4e11d0c 18500->18501 18503 4e11d31 18501->18503 18508 4e11450 18501->18508 18503->18495 18505 4e11d0c 18504->18505 18506 4e11d31 18505->18506 18507 4e11450 LoadLibraryExW 18505->18507 18506->18495 18507->18506 18509 4e11f18 LoadLibraryExW 18508->18509 18511 4e11fd4 18509->18511 18511->18503 18513 4e185f1 18512->18513 18514 4e18625 CreateWindowExW 18512->18514 18513->18486 18516 4e1880e 18514->18516 18517 d5d01c 18518 d5d034 18517->18518 18519 d5d08e 18518->18519 18524 4e188d0 18518->18524 18528 4e17acc 18518->18528 18537 4e19688 18518->18537 18547 4e188c3 18518->18547 18525 4e188f6 18524->18525 18526 4e17acc CallWindowProcW 18525->18526 18527 4e18917 18526->18527 18527->18519 18529 4e17ad7 18528->18529 18530 4e196f9 18529->18530 18532 4e196e9 18529->18532 18533 4e196f7 18530->18533 18568 4e17bf4 18530->18568 18551 4e19820 18532->18551 18556 4e198ec 18532->18556 18562 4e19810 18532->18562 18538 4e19668 18537->18538 18541 4e1968b 18537->18541 18538->18519 18539 4e196f9 18540 4e17bf4 CallWindowProcW 18539->18540 18543 4e196f7 18539->18543 18540->18543 18541->18538 18541->18539 18542 4e196e9 18541->18542 18544 4e19820 CallWindowProcW 18542->18544 18545 4e19810 CallWindowProcW 18542->18545 18546 4e198ec CallWindowProcW 18542->18546 18544->18543 18545->18543 18546->18543 18548 4e188d0 18547->18548 18549 4e17acc CallWindowProcW 18548->18549 18550 4e18917 18549->18550 18550->18519 18553 4e19834 18551->18553 18552 4e198c0 18552->18533 18572 4e198d8 18553->18572 18575 4e198cb 18553->18575 18557 4e198aa 18556->18557 18558 4e198fa 18556->18558 18560 4e198d8 CallWindowProcW 18557->18560 18561 4e198cb CallWindowProcW 18557->18561 18559 4e198c0 18559->18533 18560->18559 18561->18559 18565 4e197f8 18562->18565 18563 4e197fa 18563->18533 18564 4e198c0 18564->18533 18565->18563 18566 4e198d8 CallWindowProcW 18565->18566 18567 4e198cb CallWindowProcW 18565->18567 18566->18564 18567->18564 18569 4e17bff 18568->18569 18570 4e1ae3a CallWindowProcW 18569->18570 18571 4e1ade9 18569->18571 18570->18571 18571->18533 18573 4e198e9 18572->18573 18578 4e1ad70 18572->18578 18573->18552 18576 4e198e9 18575->18576 18577 4e1ad70 CallWindowProcW 18575->18577 18576->18552 18577->18576 18579 4e17bf4 CallWindowProcW 18578->18579 18580 4e1ad8a 18579->18580 18580->18573 18430 4f38658 18431 4f3867e 18430->18431 18432 4f387e3 18430->18432 18431->18432 18436 4e18960 SetWindowLongW 18431->18436 18438 4e18958 18431->18438 18442 4f38244 18431->18442 18437 4e18a00 18436->18437 18437->18431 18439 4e1895d SetWindowLongW 18438->18439 18441 4e18a00 18439->18441 18441->18431 18443 4f38930 PostMessageW 18442->18443 18444 4f389dd 18443->18444 18444->18431

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 215 4e13e58-4e13ed9 GetCurrentProcess 216 4e13ee2-4e13f16 GetCurrentThread 215->216 217 4e13edb-4e13ee1 215->217 218 4e13f18-4e13f1e 216->218 219 4e13f1f-4e13f53 GetCurrentProcess 216->219 217->216 218->219 220 4e13f55-4e13f5b 219->220 221 4e13f5c-4e13f77 call 4e14019 219->221 220->221 225 4e13f7d-4e13fac GetCurrentThreadId 221->225 226 4e13fb5-4e14017 225->226 227 4e13fae-4e13fb4 225->227 227->226
                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 04E13EC8
                                  • GetCurrentThread.KERNEL32 ref: 04E13F05
                                  • GetCurrentProcess.KERNEL32 ref: 04E13F42
                                  • GetCurrentThreadId.KERNEL32 ref: 04E13F9B
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.435830680.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_4e10000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: 1249138f3e861def4d44ace2cd6b924ef5f13eb8eef94b66a1cb3c68b61f4abc
                                  • Instruction ID: f9f840bf2453b231ef0a3dc1c591682fce8a0a77af0550abc137b41668b8bbc7
                                  • Opcode Fuzzy Hash: 1249138f3e861def4d44ace2cd6b924ef5f13eb8eef94b66a1cb3c68b61f4abc
                                  • Instruction Fuzzy Hash: 795144B09007498FEB14EFAAD5487EEBBF1EF49314F248559E409A73A0D734A844CF66
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 234 4e13e68-4e13ed9 GetCurrentProcess 235 4e13ee2-4e13f16 GetCurrentThread 234->235 236 4e13edb-4e13ee1 234->236 237 4e13f18-4e13f1e 235->237 238 4e13f1f-4e13f53 GetCurrentProcess 235->238 236->235 237->238 239 4e13f55-4e13f5b 238->239 240 4e13f5c-4e13f77 call 4e14019 238->240 239->240 244 4e13f7d-4e13fac GetCurrentThreadId 240->244 245 4e13fb5-4e14017 244->245 246 4e13fae-4e13fb4 244->246 246->245
                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 04E13EC8
                                  • GetCurrentThread.KERNEL32 ref: 04E13F05
                                  • GetCurrentProcess.KERNEL32 ref: 04E13F42
                                  • GetCurrentThreadId.KERNEL32 ref: 04E13F9B
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.435830680.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_4e10000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: 641f7e7396f733243a99aebb79c58a2c042f4e3a68cbd04971a1e6f55c8227a5
                                  • Instruction ID: fceab16e10f7d11c72db85ba46690807cf4c0da47c3d095fe0956ac17cd707f4
                                  • Opcode Fuzzy Hash: 641f7e7396f733243a99aebb79c58a2c042f4e3a68cbd04971a1e6f55c8227a5
                                  • Instruction Fuzzy Hash: 835146B09013498FEB14EFAAC548BEEBBF0EB49314F248559E409B7360D734A944CF66
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 253 4e184e0-4e185ef 254 4e185f1-4e18618 call 4e17aa4 253->254 255 4e18625-4e186ce 253->255 258 4e1861d-4e1861e 254->258 259 4e186d0-4e186e2 255->259 260 4e186e5-4e186f0 255->260 259->260 261 4e186f2-4e18701 260->261 262 4e18704-4e1880c CreateWindowExW 260->262 261->262 265 4e18815-4e18880 262->265 266 4e1880e-4e18814 262->266 270 4e18882-4e18885 265->270 271 4e1888d 265->271 266->265 270->271 272 4e1888e 271->272 272->272
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.435830680.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_4e10000_dhcpmon.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cd74bf3c71ef2823c8c9ad7dc7f8750d229aecd3be94c4bdac496f1b86f8a306
                                  • Instruction ID: 40bce0870c087645c1ad1b840388187374ae888e5bbb8442787be60d2bfc4d2c
                                  • Opcode Fuzzy Hash: cd74bf3c71ef2823c8c9ad7dc7f8750d229aecd3be94c4bdac496f1b86f8a306
                                  • Instruction Fuzzy Hash: CAC10775D093589FDB12CFA4C884AD9BFB1FF0A304F16909AE448AB262D7309999CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 273 4e11a28-4e11a3d call 4e113ec 276 4e11a53-4e11a57 273->276 277 4e11a3f 273->277 278 4e11a59-4e11a63 276->278 279 4e11a6b-4e11aac 276->279 327 4e11a45 call 4e11ce8 277->327 328 4e11a45 call 4e11cf8 277->328 278->279 284 4e11ab9-4e11ac7 279->284 285 4e11aae-4e11ab6 279->285 280 4e11a4b-4e11a4d 280->276 283 4e11b88-4e11c59 280->283 321 4e11c5b-4e11c6a 283->321 322 4e11c6d-4e11caa GetModuleHandleW 283->322 287 4e11ac9-4e11ace 284->287 288 4e11aeb-4e11aed 284->288 285->284 290 4e11ad0-4e11ad7 call 4e113f8 287->290 291 4e11ad9 287->291 289 4e11af0-4e11af7 288->289 292 4e11b04-4e11b0b 289->292 293 4e11af9-4e11b01 289->293 296 4e11adb-4e11ae9 290->296 291->296 297 4e11b18-4e11b21 call 4e11408 292->297 298 4e11b0d-4e11b15 292->298 293->292 296->289 303 4e11b23-4e11b2b 297->303 304 4e11b2e-4e11b33 297->304 298->297 303->304 306 4e11b51-4e11b5e 304->306 307 4e11b35-4e11b3c 304->307 313 4e11b81-4e11b87 306->313 314 4e11b60-4e11b7e 306->314 307->306 308 4e11b3e-4e11b4e call 4e11418 call 4e11428 307->308 308->306 314->313 321->322 323 4e11cb3-4e11ce1 322->323 324 4e11cac-4e11cb2 322->324 324->323 327->280 328->280
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(?), ref: 04E11C9A
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.435830680.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_4e10000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: e87282b699db8180e23b54af783ab94eec425e59de2eb91a6f220f5090141f2c
                                  • Instruction ID: 44584b81696e151c3a777f1721b5eb2f989e37b50f8fb00812a0e3a87c5c2c75
                                  • Opcode Fuzzy Hash: e87282b699db8180e23b54af783ab94eec425e59de2eb91a6f220f5090141f2c
                                  • Instruction Fuzzy Hash: 3791E370A00B098FDB24DF69D484A9AFBF1BF48308F04992AE546E7760E734E945CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 329 4e1862c-4e186ce 331 4e186d0-4e186e2 329->331 332 4e186e5-4e186f0 329->332 331->332 333 4e186f2-4e18701 332->333 334 4e18704-4e18764 332->334 333->334 336 4e1876c-4e1880c CreateWindowExW 334->336 337 4e18815-4e18880 336->337 338 4e1880e-4e18814 336->338 342 4e18882-4e18885 337->342 343 4e1888d 337->343 338->337 342->343 344 4e1888e 343->344 344->344
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 04E187F9
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.435830680.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_4e10000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 517e422452f8ed3130cdd64db00367a6e6b70fbbb5d09389cdb4eb8a930ac520
                                  • Instruction ID: 13caee76b23921651e0ea62ef91f8b5b5a71550d250c7bc241fd683b1b4af183
                                  • Opcode Fuzzy Hash: 517e422452f8ed3130cdd64db00367a6e6b70fbbb5d09389cdb4eb8a930ac520
                                  • Instruction Fuzzy Hash: EA718BB4D00218DFDF20CFA9D984ADEBBF1BF09314F5491AAE408A7221D730AA85CF55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 345 4e18638-4e186ce 346 4e186d0-4e186e2 345->346 347 4e186e5-4e186f0 345->347 346->347 348 4e186f2-4e18701 347->348 349 4e18704-4e18764 347->349 348->349 351 4e1876c-4e1880c CreateWindowExW 349->351 352 4e18815-4e18880 351->352 353 4e1880e-4e18814 351->353 357 4e18882-4e18885 352->357 358 4e1888d 352->358 353->352 357->358 359 4e1888e 358->359 359->359
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 04E187F9
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.435830680.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_4e10000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 883bf95afb2c6259ce9fb93964b251603924d4129f571663b2ad35f806ff73da
                                  • Instruction ID: 9e42c1e125f03ee8b3c7f680c6104333707e42381189c9c875aeedb4c63ab124
                                  • Opcode Fuzzy Hash: 883bf95afb2c6259ce9fb93964b251603924d4129f571663b2ad35f806ff73da
                                  • Instruction Fuzzy Hash: 60717BB4D00218DFDF20CFA9C984BDEBBF1BB09314F5491AAE408A7211D734AA85CF55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 360 266bc88-266d60c CreateActCtxA 365 266d615-266d69a 360->365 366 266d60e-266d614 360->366 375 266d6c7-266d6cf 365->375 376 266d69c-266d6bf 365->376 366->365 376->375
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 0266D5F9
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.426696497.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_2660000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: a4d9870a3323e676fb47b17e9a78fe453e666106341440557f6200cb24d9e318
                                  • Instruction ID: 7cdbfeeb5b746f34da152dd18f11fb23bdf4fd698b6035747ac3929d7913bfad
                                  • Opcode Fuzzy Hash: a4d9870a3323e676fb47b17e9a78fe453e666106341440557f6200cb24d9e318
                                  • Instruction Fuzzy Hash: B551E471D0421C8FEB20DFA4C944BDEBBB5BF55308F1180A9D509BB251DB71AA89CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 380 4e14090-4e1416b DuplicateHandle 381 4e14174-4e141b4 380->381 382 4e1416d-4e14173 380->382 382->381
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 04E1415B
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.435830680.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_4e10000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: d83469a92ad2a9807a1404ac047d5092049aa3edf00d857990030de939607b65
                                  • Instruction ID: 9f783c37befe0596154928059cdd03197087ce94851d16b819e5db2d448b610c
                                  • Opcode Fuzzy Hash: d83469a92ad2a9807a1404ac047d5092049aa3edf00d857990030de939607b65
                                  • Instruction Fuzzy Hash: EE4166B9E002589FCF00CFA9D984ADEBBF5BB19314F14902AE918BB310D335A955CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 386 4e14088-4e1416b DuplicateHandle 387 4e14174-4e141b4 386->387 388 4e1416d-4e14173 386->388 388->387
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 04E1415B
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.435830680.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_4e10000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 8a7ca0994bc4c513a1aca7fdea3b5ed54b5d547c651db0f436cbd66849d9c6e2
                                  • Instruction ID: 26871195f4892f17e57cd419631ce84ba6ae8f34dc0067875e59784a3b9b81f3
                                  • Opcode Fuzzy Hash: 8a7ca0994bc4c513a1aca7fdea3b5ed54b5d547c651db0f436cbd66849d9c6e2
                                  • Instruction Fuzzy Hash: 634175B9E002599FCF00CFA9D984ADEBBF5BB19314F14902AE918BB310D335AA55CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 392 2667e18-2667ed7 VirtualProtect 395 2667ee0-2667f1c 392->395 396 2667ed9-2667edf 392->396 396->395
                                  APIs
                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02667EC7
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.426696497.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_2660000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: e8e1430bb028e5045c96bf161ed35704673981f9f60960c931b5cb292aca13b1
                                  • Instruction ID: 20596290346bd9bd696b487e70efc23e64ed39e863ccbbcfaf037dc1f7d44640
                                  • Opcode Fuzzy Hash: e8e1430bb028e5045c96bf161ed35704673981f9f60960c931b5cb292aca13b1
                                  • Instruction Fuzzy Hash: 7E3197B9D042589FCF10CFA9D984AEEFBF1AB09314F24902AE814B7350D775A945CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 399 4e11450-4e11f6c 401 4e11f80-4e11fd2 LoadLibraryExW 399->401 402 4e11f6e-4e11f7d 399->402 403 4e11fd4-4e11fda 401->403 404 4e11fdb-4e12019 401->404 402->401 403->404
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(?,?,?), ref: 04E11FC2
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.435830680.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_4e10000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 8f80a1e4f37fb4a5aa7cee7bfcab254cb284b11f657c0c233b4d86ecd83ee7ca
                                  • Instruction ID: 553df2be15adde5b26fe45e8020bd88124a54526d3b6515a65624e9e473a6f32
                                  • Opcode Fuzzy Hash: 8f80a1e4f37fb4a5aa7cee7bfcab254cb284b11f657c0c233b4d86ecd83ee7ca
                                  • Instruction Fuzzy Hash: AF4185B4D052589FDF10CFAAD884AAEFBF1BB49314F14902AE914BB220D334A945CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 408 4e17bf4-4e1addc 411 4e1ade2-4e1ade7 408->411 412 4e1ae8c-4e1aeac call 4e17acc 408->412 413 4e1ade9-4e1ae20 411->413 414 4e1ae3a-4e1ae72 CallWindowProcW 411->414 420 4e1aeaf-4e1aebc 412->420 422 4e1ae22-4e1ae28 413->422 423 4e1ae29-4e1ae38 413->423 416 4e1ae74-4e1ae7a 414->416 417 4e1ae7b-4e1ae8a 414->417 416->417 417->420 422->423 423->420
                                  APIs
                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 04E1AE61
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.435830680.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_4e10000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: CallProcWindow
                                  • String ID:
                                  • API String ID: 2714655100-0
                                  • Opcode ID: 6d9db3e11ea8be142381a034fa1a53b715b80c1c44dcba996f24c53d343f1282
                                  • Instruction ID: f50c8596c0cc57219ebf877c972bc03cc7e4a17f54033a5d741916e1337c63ad
                                  • Opcode Fuzzy Hash: 6d9db3e11ea8be142381a034fa1a53b715b80c1c44dcba996f24c53d343f1282
                                  • Instruction Fuzzy Hash: 894115B4A00305CFDB14DF99C488AAABBF5FB88318F15C459D519AB321D774E881CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(?,?,?), ref: 04E11FC2
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.435830680.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_4e10000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 46419700cd3ea7b9db739bd34a71accc8cc30ddfc5c12a605d9ae7b78be4f065
                                  • Instruction ID: 21bdc5190a43a71c874b503727e80385a65c2d9dfcdae8a33c18c456cc18008e
                                  • Opcode Fuzzy Hash: 46419700cd3ea7b9db739bd34a71accc8cc30ddfc5c12a605d9ae7b78be4f065
                                  • Instruction Fuzzy Hash: 8D4198B4D012599FDF10CFA9D884ADEFBF1BB49314F14906AE914BB220D334A946CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02667EC7
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.426696497.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_2660000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: a5a77d299cda5fb49dc666059238d0b78324a99ef4bf87ad7d7e62f45d139b27
                                  • Instruction ID: fd4e2a9718c55866b4581963a507800fd7e6b4c231199fd4d00aef0b82e0d501
                                  • Opcode Fuzzy Hash: a5a77d299cda5fb49dc666059238d0b78324a99ef4bf87ad7d7e62f45d139b27
                                  • Instruction Fuzzy Hash: C53177B9D042589FCB10CFA9D984AEEFBB1AB19314F14902AE814B7210D775A945CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • PostMessageW.USER32(?,?,?,00000000), ref: 04F389CB
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.436057198.0000000004F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_4f30000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: 1462a7b9eb969304b5fc44c7d0da2bf9aa52eb39d67712f3d075e933cb3a61ab
                                  • Instruction ID: 1a2e66ff1f4f240496819ac02d67556eab73ead8bf19f63f843cf4b79470594c
                                  • Opcode Fuzzy Hash: 1462a7b9eb969304b5fc44c7d0da2bf9aa52eb39d67712f3d075e933cb3a61ab
                                  • Instruction Fuzzy Hash: 9C3187B9D05258AFCF10CFA9D884ADEFBF4AB49314F14902AE814BB310D375A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetWindowLongW.USER32(?,?,?), ref: 04E189EE
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.435830680.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_4e10000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: LongWindow
                                  • String ID:
                                  • API String ID: 1378638983-0
                                  • Opcode ID: cd4108ebc104dc6975e0bdd94437414e0b25804cc0823cb0628257f65d5bd3c7
                                  • Instruction ID: 3f9f705c2debb49e236353d9f467f2ce78f413b9829e8d3a631c690939d4c9ea
                                  • Opcode Fuzzy Hash: cd4108ebc104dc6975e0bdd94437414e0b25804cc0823cb0628257f65d5bd3c7
                                  • Instruction Fuzzy Hash: 9031A7B9D012589FCB10CFA9E984ADEFBF4BB09320F14952AE814B7350D335A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(?), ref: 04E11C9A
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.435830680.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_4e10000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 2cbfadf1f55936a42e99e1f83856e01c564c120755b4863019e52e3f2c7edd43
                                  • Instruction ID: 78cd3f10dc28b3d3d8ade42c212f3dab61e51feb73b09025a99c6f1e512fdd12
                                  • Opcode Fuzzy Hash: 2cbfadf1f55936a42e99e1f83856e01c564c120755b4863019e52e3f2c7edd43
                                  • Instruction Fuzzy Hash: C231B8B4D002599FCB14CFAAD884ADEFBF5BB49314F14906AE818B7320D334A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetWindowLongW.USER32(?,?,?), ref: 04E189EE
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.435830680.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_4e10000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: LongWindow
                                  • String ID:
                                  • API String ID: 1378638983-0
                                  • Opcode ID: ad941995d5a6d7dea8fea21caa51830dc12d0e1149fbd5ccd41c6349903c36b0
                                  • Instruction ID: 8b007fb4fa29d13fe54b77de4388537dc2a8dbeddda001f1e9d9da90b3808b5d
                                  • Opcode Fuzzy Hash: ad941995d5a6d7dea8fea21caa51830dc12d0e1149fbd5ccd41c6349903c36b0
                                  • Instruction Fuzzy Hash: 223195B9D012189FCB10CFA9D984ADEFBF4BB49310F14902AE818B7310D375A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000018.00000002.426031739.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_d4d000_dhcpmon.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 815838b1d80a7441f73236a33fa5c3725bd3acc2de36a8411b5234e7e018ba6e
                                  • Instruction ID: 8c7bec79e4e543732e29b91b13af737a7af196021f5a8ac54feb641103d5b95e
                                  • Opcode Fuzzy Hash: 815838b1d80a7441f73236a33fa5c3725bd3acc2de36a8411b5234e7e018ba6e
                                  • Instruction Fuzzy Hash: 3B2137B2504240DFCF01DF14D9C0B2ABF66FB98328F28C5A9E9494B246C736D856CBB1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000018.00000002.426203283.0000000000D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D5D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_d5d000_dhcpmon.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bafce7154283767b408518f00cbe7de90cc3b771ba00c9422628ed0a4dd5a0fb
                                  • Instruction ID: c160e76bf1b5dfccffa645df4fbb42ceb1672a562a6dc7691ccecbd6ec461574
                                  • Opcode Fuzzy Hash: bafce7154283767b408518f00cbe7de90cc3b771ba00c9422628ed0a4dd5a0fb
                                  • Instruction Fuzzy Hash: FA21F2B1504340EFDF21DF20D9C0B26BBA6FB88319F24C5A9ED494B246C776D85ACA71
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000018.00000002.426203283.0000000000D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D5D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_d5d000_dhcpmon.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4ab64c67ccbe4842e78bd3f459e57b80f3da62ee5f789ce56d4ab8196ae4ba07
                                  • Instruction ID: 7f9f3f4c248f23ce02ed9e214d8780d4098289a1fa32e1797947b4e9f60628a8
                                  • Opcode Fuzzy Hash: 4ab64c67ccbe4842e78bd3f459e57b80f3da62ee5f789ce56d4ab8196ae4ba07
                                  • Instruction Fuzzy Hash: 85210371504240DFCF20DF28D5C0B26BB62EB84315F24C569DC494B286C336D85BCA71
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000018.00000002.426203283.0000000000D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D5D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_d5d000_dhcpmon.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8d04d480a0c2e2b9a52e2a8a47981c5302faa1ab0e0e5f5fd66fee6c8502964e
                                  • Instruction ID: 43c3e8e712793deb7a7942b28da306492c231144642f1ac68c35cb036803835e
                                  • Opcode Fuzzy Hash: 8d04d480a0c2e2b9a52e2a8a47981c5302faa1ab0e0e5f5fd66fee6c8502964e
                                  • Instruction Fuzzy Hash: A5217F755093C08FCB12CF24D994715BF71EB46214F28C5EAD8498B6A7C33A980ACB72
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000018.00000002.426031739.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_d4d000_dhcpmon.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d64477db9f9483eff024ad21beefddb018fc80a7aa46d68ce26437d5177f2104
                                  • Instruction ID: 6dfd76cb742d4d997cbeea327d835a2c6989d388e47876b92049c5661c145172
                                  • Opcode Fuzzy Hash: d64477db9f9483eff024ad21beefddb018fc80a7aa46d68ce26437d5177f2104
                                  • Instruction Fuzzy Hash: 8511E676504280CFCF11CF10D5C4B16BF72FB89324F28C6A9D8454B656C336D86ACBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000018.00000002.426203283.0000000000D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D5D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_d5d000_dhcpmon.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7a673041faea760638411a329164a2550987f39295efeab768d269dd870a3f12
                                  • Instruction ID: ec93ba83d84053b1a5a86d6fed97e6212502151da0dcad630e7034b6863aa93e
                                  • Opcode Fuzzy Hash: 7a673041faea760638411a329164a2550987f39295efeab768d269dd870a3f12
                                  • Instruction Fuzzy Hash: 97117975904280DFCB11DF10D5C4B15BBA2FB84324F28C6A9DC494B656C33AD85ACB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000018.00000002.426031739.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_d4d000_dhcpmon.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b0d9b90f5b39afd65b5c1ba0d3810b934082f03bf47f92c7bc14114c9ff36cd0
                                  • Instruction ID: 42228c5b8c7fff9efb40fd8558053bf0d6f207d0e2151e3f0e9c381b1effec98
                                  • Opcode Fuzzy Hash: b0d9b90f5b39afd65b5c1ba0d3810b934082f03bf47f92c7bc14114c9ff36cd0
                                  • Instruction Fuzzy Hash: E901F7714083449BEB108E25CD84B66BBD8DF41378F1CC55AE9064B246D379D840C7B1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000018.00000002.426031739.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_d4d000_dhcpmon.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ef3deed5ac73b8682f5f9cb16e4b491fdd6e0c020d18cb9f1f19432ffe9c0504
                                  • Instruction ID: 02a3bc5d89cdecb6ac0b3f4cbfbf1908ee423cd12622fc8082de0eac7e500612
                                  • Opcode Fuzzy Hash: ef3deed5ac73b8682f5f9cb16e4b491fdd6e0c020d18cb9f1f19432ffe9c0504
                                  • Instruction Fuzzy Hash: 90F04F714043849BEB108E15C888B62FB98EB91774F18C55AED095B286C3799844CAB1
                                  Uniqueness

                                  Uniqueness Score: -1.00%