Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4An07Q7I8G.exe

Overview

General Information

Sample Name:4An07Q7I8G.exe
Original Sample Name:b454c259c82c354cf5375ec490238507.exe
Analysis ID:878387
MD5:b454c259c82c354cf5375ec490238507
SHA1:a0a3125c92df4657053f9001f38749a5d263471f
SHA256:4188fbef59670a8fa8cee6a75514de835973823c58e66f6d5b622c695bd1ad07
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 4An07Q7I8G.exe (PID: 5516 cmdline: C:\Users\user\Desktop\4An07Q7I8G.exe MD5: B454C259C82C354CF5375EC490238507)
    • 4An07Q7I8G.exe (PID: 4900 cmdline: C:\Users\user\Desktop\4An07Q7I8G.exe MD5: B454C259C82C354CF5375EC490238507)
    • 4An07Q7I8G.exe (PID: 5672 cmdline: C:\Users\user\Desktop\4An07Q7I8G.exe MD5: B454C259C82C354CF5375EC490238507)
      • schtasks.exe (PID: 4700 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5724 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA8D3.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 2028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • 4An07Q7I8G.exe (PID: 1252 cmdline: C:\Users\user\Desktop\4An07Q7I8G.exe 0 MD5: B454C259C82C354CF5375EC490238507)
    • 4An07Q7I8G.exe (PID: 5904 cmdline: C:\Users\user\Desktop\4An07Q7I8G.exe MD5: B454C259C82C354CF5375EC490238507)
  • dhcpmon.exe (PID: 3348 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: B454C259C82C354CF5375EC490238507)
    • dhcpmon.exe (PID: 3224 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: B454C259C82C354CF5375EC490238507)
  • dhcpmon.exe (PID: 3636 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: B454C259C82C354CF5375EC490238507)
    • dhcpmon.exe (PID: 5724 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: B454C259C82C354CF5375EC490238507)
    • dhcpmon.exe (PID: 3956 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: B454C259C82C354CF5375EC490238507)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "540c4d56-ad4d-4ca4-9f9f-305dba1d", "Group": "Default", "Domain1": "jasonbourneblack.ddns.net", "Domain2": "127.0.0.1", "Port": 4032, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x435b5:$a: NanoCore
    • 0x4360e:$a: NanoCore
    • 0x4364b:$a: NanoCore
    • 0x436c4:$a: NanoCore
    • 0x56d6f:$a: NanoCore
    • 0x56d84:$a: NanoCore
    • 0x56db9:$a: NanoCore
    • 0x43617:$b: ClientPlugin
    • 0x43654:$b: ClientPlugin
    • 0x43f52:$b: ClientPlugin
    • 0x43f5f:$b: ClientPlugin
    • 0x56b2b:$b: ClientPlugin
    • 0x56b46:$b: ClientPlugin
    • 0x56b76:$b: ClientPlugin
    • 0x56d8d:$b: ClientPlugin
    • 0x56dc2:$b: ClientPlugin
    • 0x56ca3:$c: ProjectData
    • 0x43a9f:$g: LogClientMessage
    • 0x43a1f:$i: get_Connected
    • 0x575f2:$j: #=q
    • 0x57622:$j: #=q
    00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x4364b:$a1: NanoCore.ClientPluginHost
    • 0x56db9:$a1: NanoCore.ClientPluginHost
    • 0x4360e:$a2: NanoCore.ClientPlugin
    • 0x56d84:$a2: NanoCore.ClientPlugin
    • 0x439e2:$b1: get_BuilderSettings
    • 0x5bcff:$b1: get_BuilderSettings
    • 0x43699:$b4: IClientAppHost
    • 0x43a53:$b6: AddHostEntry
    • 0x43ac2:$b7: LogClientException
    • 0x5bc6e:$b7: LogClientException
    • 0x43a37:$b8: PipeExists
    • 0x43686:$b9: IClientLoggingHost
    • 0x56dd3:$b9: IClientLoggingHost
    00000009.00000002.421527210.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xff8d:$a1: NanoCore.ClientPluginHost
    • 0xff4d:$a2: NanoCore.ClientPlugin
    • 0x11ea6:$b1: get_BuilderSettings
    • 0xfda9:$b2: ClientLoaderForm.resources
    • 0x115c6:$b3: PluginCommand
    • 0xff7e:$b4: IClientAppHost
    • 0xffb7:$b9: IClientLoggingHost
    0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 24 entries
      SourceRuleDescriptionAuthorStrings
      9.2.dhcpmon.exe.30d968c.0.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      9.2.dhcpmon.exe.30d968c.0.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      9.2.dhcpmon.exe.30d968c.0.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xe38:$x2: NanoCore.ClientPlugin
      • 0xe75:$x3: NanoCore.ClientPluginHost
      • 0xe5a:$i1: IClientApp
      • 0xe4e:$i2: IClientData
      • 0xe29:$i3: IClientNetwork
      • 0xec3:$i4: IClientAppHost
      • 0xe65:$i5: IClientDataHost
      • 0xeb0:$i6: IClientLoggingHost
      • 0xe8f:$i7: IClientNetworkHost
      • 0xea2:$i8: IClientUIHost
      • 0xed2:$i9: IClientNameObjectCollection
      • 0xef7:$i10: IClientReadOnlyNameObjectCollection
      • 0xe41:$s1: ClientPlugin
      • 0x177c:$s1: ClientPlugin
      • 0x1789:$s1: ClientPlugin
      • 0x11f9:$s6: get_ClientSettings
      • 0x1249:$s7: get_Connected
      9.2.dhcpmon.exe.30d968c.0.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0xe75:$a1: NanoCore.ClientPluginHost
      • 0xe38:$a2: NanoCore.ClientPlugin
      • 0x120c:$b1: get_BuilderSettings
      • 0xec3:$b4: IClientAppHost
      • 0x127d:$b6: AddHostEntry
      • 0x12ec:$b7: LogClientException
      • 0x1261:$b8: PipeExists
      • 0xeb0:$b9: IClientLoggingHost
      10.2.4An07Q7I8G.exe.40595f8.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      Click to see the 56 entries

      AV Detection

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\4An07Q7I8G.exe, ProcessId: 5672, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\4An07Q7I8G.exe, ProcessId: 5672, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Persistence and Installation Behavior

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\4An07Q7I8G.exe, ParentImage: C:\Users\user\Desktop\4An07Q7I8G.exe, ParentProcessId: 5672, ParentProcessName: 4An07Q7I8G.exe, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp, ProcessId: 4700, ProcessName: schtasks.exe

      Stealing of Sensitive Information

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\4An07Q7I8G.exe, ProcessId: 5672, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\4An07Q7I8G.exe, ProcessId: 5672, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Timestamp:192.168.2.7141.98.6.1674971040322816718 05/30/23-16:40:13.977539
      SID:2816718
      Source Port:49710
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674970540322816766 05/30/23-16:39:33.706408
      SID:2816766
      Source Port:49705
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971540322816766 05/30/23-16:40:50.973824
      SID:2816766
      Source Port:49715
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971840322816766 05/30/23-16:41:18.114338
      SID:2816766
      Source Port:49718
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972140322816766 05/30/23-16:41:38.417178
      SID:2816766
      Source Port:49721
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972740322816718 05/30/23-16:42:22.509655
      SID:2816718
      Source Port:49727
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674970840322816766 05/30/23-16:40:00.413491
      SID:2816766
      Source Port:49708
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971140322816766 05/30/23-16:40:21.553606
      SID:2816766
      Source Port:49711
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:141.98.6.167192.168.2.74032497252841753 05/30/23-16:42:09.874096
      SID:2841753
      Source Port:4032
      Destination Port:49725
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971740322816718 05/30/23-16:41:08.713034
      SID:2816718
      Source Port:49717
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:141.98.6.167192.168.2.74032497212810290 05/30/23-16:41:38.152963
      SID:2810290
      Source Port:4032
      Destination Port:49721
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:141.98.6.167192.168.2.74032497312841753 05/30/23-16:42:49.623506
      SID:2841753
      Source Port:4032
      Destination Port:49731
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:141.98.6.167192.168.2.74032497332841753 05/30/23-16:43:01.178074
      SID:2841753
      Source Port:4032
      Destination Port:49733
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972240322816766 05/30/23-16:41:46.251062
      SID:2816766
      Source Port:49722
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674970640322816766 05/30/23-16:39:46.341150
      SID:2816766
      Source Port:49706
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971240322816766 05/30/23-16:40:27.702458
      SID:2816766
      Source Port:49712
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:141.98.6.167192.168.2.74032497072810290 05/30/23-16:39:52.215019
      SID:2810290
      Source Port:4032
      Destination Port:49707
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674970740322816766 05/30/23-16:39:52.717055
      SID:2816766
      Source Port:49707
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971640322816766 05/30/23-16:41:00.324127
      SID:2816766
      Source Port:49716
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972640322816766 05/30/23-16:42:16.962875
      SID:2816766
      Source Port:49726
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674973240322816766 05/30/23-16:42:56.061988
      SID:2816766
      Source Port:49732
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972340322816766 05/30/23-16:41:55.674302
      SID:2816766
      Source Port:49723
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971340322816766 05/30/23-16:40:34.783339
      SID:2816766
      Source Port:49713
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971040322816766 05/30/23-16:40:14.977403
      SID:2816766
      Source Port:49710
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971740322816766 05/30/23-16:41:08.713034
      SID:2816766
      Source Port:49717
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972740322816766 05/30/23-16:42:23.748746
      SID:2816766
      Source Port:49727
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674970440322816766 05/30/23-16:39:25.146472
      SID:2816766
      Source Port:49704
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971940322816766 05/30/23-16:41:24.254865
      SID:2816766
      Source Port:49719
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971440322816766 05/30/23-16:40:42.455969
      SID:2816766
      Source Port:49714
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674970940322816766 05/30/23-16:40:08.035340
      SID:2816766
      Source Port:49709
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972040322816766 05/30/23-16:41:31.469338
      SID:2816766
      Source Port:49720
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972440322816766 05/30/23-16:42:04.621976
      SID:2816766
      Source Port:49724
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674973040322816766 05/30/23-16:42:44.464795
      SID:2816766
      Source Port:49730
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972840322816766 05/30/23-16:42:31.313902
      SID:2816766
      Source Port:49728
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674973440322816766 05/30/23-16:43:07.123160
      SID:2816766
      Source Port:49734
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "540c4d56-ad4d-4ca4-9f9f-305dba1d", "Group": "Default", "Domain1": "jasonbourneblack.ddns.net", "Domain2": "127.0.0.1", "Port": 4032, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
      Source: 4An07Q7I8G.exeReversingLabs: Detection: 24%
      Source: 4An07Q7I8G.exeVirustotal: Detection: 34%Perma Link
      Source: jasonbourneblack.ddns.netAvira URL Cloud: Label: malware
      Source: jasonbourneblack.ddns.netVirustotal: Detection: 10%Perma Link
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 24%
      Source: Yara matchFile source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTR
      Source: 4An07Q7I8G.exeJoe Sandbox ML: detected
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
      Source: 4An07Q7I8G.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 4An07Q7I8G.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: AxiBQ.pdb source: 4An07Q7I8G.exe, dhcpmon.exe.2.dr
      Source: Binary string: AxiBQ.pdbSHA256 source: 4An07Q7I8G.exe, dhcpmon.exe.2.dr
      Source: Binary string: AxiBQ.pdbS source: 4An07Q7I8G.exe, 00000002.00000003.374904648.00000000013EF000.00000004.00000020.00020000.00000000.sdmp
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 4x nop then jmp 07AB9A25h
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 4x nop then jmp 06F89A25h
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then jmp 06879A25h

      Networking

      barindex
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49704 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49705 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49706 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 141.98.6.167:4032 -> 192.168.2.7:49707
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49707 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49708 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49709 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49710 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.7:49710 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49711 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49712 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49713 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49714 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49715 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49716 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49717 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.7:49717 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49718 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49719 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49720 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 141.98.6.167:4032 -> 192.168.2.7:49721
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49721 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49722 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49723 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49724 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 141.98.6.167:4032 -> 192.168.2.7:49725
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49726 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49727 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.7:49727 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49728 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49730 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 141.98.6.167:4032 -> 192.168.2.7:49731
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49732 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 141.98.6.167:4032 -> 192.168.2.7:49733
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49734 -> 141.98.6.167:4032
      Source: Malware configuration extractorURLs: jasonbourneblack.ddns.net
      Source: Malware configuration extractorURLs: 127.0.0.1
      Source: unknownDNS query: name: jasonbourneblack.ddns.net
      Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
      Source: global trafficTCP traffic: 192.168.2.7:49704 -> 141.98.6.167:4032
      Source: 4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.wikip
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
      Source: 4An07Q7I8G.exe, 00000000.00000003.352081387.0000000006252000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: 4An07Q7I8G.exe, 00000000.00000003.355660959.0000000006286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: 4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersN
      Source: 4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361333707.000000000624C000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
      Source: 4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361333707.000000000624C000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm
      Source: 4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361333707.000000000624C000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comts
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: 4An07Q7I8G.exe, 00000000.00000003.351944589.0000000006242000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn&
      Source: 4An07Q7I8G.exe, 00000000.00000003.351720872.000000000624A000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.351851946.000000000624A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/SCz
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: 4An07Q7I8G.exe, 00000000.00000003.358377438.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.358415531.000000000624D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
      Source: 4An07Q7I8G.exe, 00000000.00000003.358467096.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.358377438.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.358415531.000000000624D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/-
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: 4An07Q7I8G.exe, 00000000.00000003.358377438.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: 4An07Q7I8G.exe, 00000000.00000003.348952309.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349006793.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349107893.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349149259.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349055971.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.348875232.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349026832.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349081700.0000000006264000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comFUw
      Source: 4An07Q7I8G.exe, 00000000.00000003.354701779.0000000006286000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.354764386.0000000006286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
      Source: 4An07Q7I8G.exe, 00000000.00000003.349978172.0000000006243000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.typography.net-t
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: unknownDNS traffic detected: queries for: jasonbourneblack.ddns.net
      Source: 4An07Q7I8G.exe, 00000000.00000002.366438687.00000000014E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
      Source: dhcpmon.exe, 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTR

      System Summary

      barindex
      Source: 9.2.dhcpmon.exe.30d968c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 9.2.dhcpmon.exe.30d968c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 9.2.dhcpmon.exe.30d968c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.4An07Q7I8G.exe.30595d4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.4An07Q7I8G.exe.30595d4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.4An07Q7I8G.exe.30595d4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000009.00000002.421527210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000002.00000003.388393335.0000000006B6F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5672, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 4An07Q7I8G.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 9.2.dhcpmon.exe.30d968c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.30d968c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.30d968c.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 9.2.dhcpmon.exe.30d968c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.4An07Q7I8G.exe.30595d4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.4An07Q7I8G.exe.30595d4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.4An07Q7I8G.exe.30595d4.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.4An07Q7I8G.exe.30595d4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000009.00000002.421527210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000002.00000003.388393335.0000000006B6F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5672, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_0315C284
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_0315E650
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_0315E640
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_07AB8E58
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_07AB8E4D
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_07AB04F0
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_07AB2430
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_07AB1020
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_07AB0040
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_012AC284
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_012AE640
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_012AE650
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F8AEE8
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F88E58
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F804F0
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F82430
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F80040
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F81020
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F88E48
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_00B8C284
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_00B8E650
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_00B8E640
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06878E58
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_068704F0
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06872430
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06871020
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06870040
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF5410
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF0040
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF8E11
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AFBB06
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF58CE
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF9990
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AFE6F9
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF95A8
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF95B8
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF0006
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AFE050
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF1AC5
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF1828
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF1817
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF1AC8
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess Stats: CPU usage > 98%
      Source: 4An07Q7I8G.exe, 00000000.00000002.386674839.0000000007AC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000000.00000002.366438687.00000000014E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000000.00000000.346160675.000000000100C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAxiBQ.exe4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000000.00000002.367447161.0000000003341000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000002.00000003.374904648.00000000013EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAxiBQ.exe4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000002.00000003.388393335.0000000006B6F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000007.00000002.400346227.0000000003E14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000007.00000002.400346227.0000000003E82000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000007.00000002.394868341.0000000000E2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000007.00000002.398108722.0000000002B6C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 0000000A.00000002.433647519.0000000004060000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 0000000A.00000002.433647519.0000000004058000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 0000000A.00000002.425979907.0000000001079000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 0000000A.00000002.433647519.0000000004071000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exeBinary or memory string: OriginalFilenameAxiBQ.exe4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: dhcpmon.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: 4An07Q7I8G.exeReversingLabs: Detection: 24%
      Source: 4An07Q7I8G.exeVirustotal: Detection: 34%
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeFile read: C:\Users\user\Desktop\4An07Q7I8G.exeJump to behavior
      Source: 4An07Q7I8G.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA8D3.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe 0
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA8D3.tmp
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4An07Q7I8G.exe.logJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeFile created: C:\Users\user\AppData\Local\Temp\tmpA70D.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@22/11@32/1
      Source: 4An07Q7I8G.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4036:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2028:120:WilError_01
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{540c4d56-ad4d-4ca4-9f9f-305dba1da640}
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
      Source: 4An07Q7I8G.exe, 00000000.00000003.354914939.000000000625A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Kristen is a Trademark of International Typeface Corporation.slnt
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: 4An07Q7I8G.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: 4An07Q7I8G.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: 4An07Q7I8G.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: AxiBQ.pdb source: 4An07Q7I8G.exe, dhcpmon.exe.2.dr
      Source: Binary string: AxiBQ.pdbSHA256 source: 4An07Q7I8G.exe, dhcpmon.exe.2.dr
      Source: Binary string: AxiBQ.pdbS source: 4An07Q7I8G.exe, 00000002.00000003.374904648.00000000013EF000.00000004.00000020.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: 4An07Q7I8G.exe, TrafficSimulationSCE/MainScreen.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 0.0.4An07Q7I8G.exe.f50000.0.unpack, TrafficSimulationSCE/MainScreen.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: dhcpmon.exe.2.dr, TrafficSimulationSCE/MainScreen.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_07AB5600 pushad ; iretd
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F85600 pushad ; iretd
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F87FFA push es; retf
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F87F09 push es; retf
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06875600 pushad ; iretd
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06877B6B push es; ret
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AFC2A0 push esp; iretd
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AFB0C3 push eax; ret
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AFB0C0 pushad ; ret
      Source: initial sampleStatic PE information: section name: .text entropy: 7.701181340859135
      Source: initial sampleStatic PE information: section name: .text entropy: 7.701181340859135
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeFile opened: C:\Users\user\Desktop\4An07Q7I8G.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exe TID: 2400Thread sleep time: -41202s >= -30000s
      Source: C:\Users\user\Desktop\4An07Q7I8G.exe TID: 6920Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\4An07Q7I8G.exe TID: 324Thread sleep time: -10145709240540247s >= -30000s
      Source: C:\Users\user\Desktop\4An07Q7I8G.exe TID: 1184Thread sleep time: -41202s >= -30000s
      Source: C:\Users\user\Desktop\4An07Q7I8G.exe TID: 3424Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2948Thread sleep time: -41202s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5768Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 628Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\4An07Q7I8G.exe TID: 5700Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2200Thread sleep time: -41202s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5036Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4012Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWindow / User API: threadDelayed 9254
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWindow / User API: foregroundWindowGot 825
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWindow / User API: foregroundWindowGot 700
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 41202
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 41202
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41202
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41202
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeMemory written: C:\Users\user\Desktop\4An07Q7I8G.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeMemory written: C:\Users\user\Desktop\4An07Q7I8G.exe base: 400000 value starts with: 4D5A
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA8D3.tmp
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: 4An07Q7I8G.exe, 00000002.00000003.615288362.00000000037BF000.00000004.00000800.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000002.00000003.615288362.0000000003798000.00000004.00000800.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000002.00000003.615288362.0000000003745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: 4An07Q7I8G.exe, 00000002.00000003.615288362.00000000037BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager g4
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Users\user\Desktop\4An07Q7I8G.exe VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Users\user\Desktop\4An07Q7I8G.exe VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Users\user\Desktop\4An07Q7I8G.exe VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Users\user\Desktop\4An07Q7I8G.exe VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: 4An07Q7I8G.exe, 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 4An07Q7I8G.exe, 00000002.00000003.388393335.0000000006B6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dhcpmon.exe, 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dhcpmon.exe, 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: dhcpmon.exe, 00000009.00000002.421527210.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dhcpmon.exe, 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dhcpmon.exe, 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: 4An07Q7I8G.exe, 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 4An07Q7I8G.exe, 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HApplicationBaseMicrosoft.VisualBasic.ApplicationServicesUserConversionsMicrosoft.VisualBasic.CompilerServicesObjectFlowControlOperatorsProjectDataStandardModuleAttributeComputerMicrosoft.VisualBasic.DevicesHideModuleNameAttributeMyGroupCollectionAttributeContextValue`1Microsoft.VisualBasic.MyServices.InternalClientInvokeDelegateNanoCoreIClientDataNanoCore.ClientPluginIClientNetworkIClientDataHostNanoCore.ClientPluginHostIClientLoggingHostIClientNetworkHostIClientUIHostIClientNameObjectCollectionIClientReadOnlyNameObjectCollectionActivatorAppDomainArgumentOutOfRangeExceptionArrayAsyncCallbackBitConverterBooleanBufferByteCharCLSCompliantAttributeGeneratedCodeAttributeSystem.CodeDom.CompilerDictionary`2System.Collections.GenericEnumeratorIEnumerable`1KeyValuePair`2List`1IEnumeratorSystem.CollectionsEditorBrowsableAttributeSystem.ComponentModelEditorBrowsableStateApplicationSettingsBaseSystem.ConfigurationSettingsBaseDateTimeDateTimeKindDelegateDebuggerDisplayAttributeSystem.DiagnosticsDebuggerHiddenAttributeDebuggerNonUserCodeAttributeDebuggerStepThroughAttributeProcessStackFrameStackTraceDoubleEnumEnvironmentExceptionCultureInfoSystem.GlobalizationIAsyncResultIDisposableInt16Int32Int64IntPtrBinaryReaderSystem.IOBinaryWriterDirectoryDirectoryInfoEndOfStreamExceptionFileFileAccessFileInfoFileModeFileStreamFileSystemInfoMemoryStreamPathStreamStringReaderMathMulticastDelegateObjectAssemblySystem.ReflectionAssemblyCompanyAttributeAssemblyCopyrightAttributeAssemblyDescriptionAttributeAssemblyFileVersionAttributeAssemblyNameAssemblyProductAttributeAssemblyTitleAttributeAssemblyTrademarkAttributeDefaultMemberAttributeMemberInfoMethodBaseResolveEventArgsResolveEventHandlerResourceManagerSystem.ResourcesCompilationRelaxationsAttributeSystem.Runtime.CompilerServicesCompilerGeneratedAttributeRuntimeCompatibilityAttributeRuntimeHelpersSuppressIldasmAttributeComVisibleAttributeSystem.Runtime.InteropServicesGuidAttributeMarshalRuntimeEnvironmentRuntimeMethodHandleRuntimeTypeHandleSuppressUnmanagedCodeSecurityAttributeSystem.SecurityStringStringSplitOptionsEncodingSystem.TextCaptureSystem.Text.RegularExpressionsGroupGroupCollectionMatchMatchCollectionRegexStringBuilderMonitorSystem.ThreadingThreadThreadPoolTimerTimerCallbackWaitCallbackTimeSpanTypeUInt16UInt32UInt64UriUriKindValueTypeVoidClipboardCreateParamsKeysMessageNativeWindow<Module>#=q$SxR33u2B2QKyvTy6OUx3VUEnsU1BBIwrFbNm_dTmvc=#=q1WnXnf5Kn3oZdelfZ9atXg==#=q4Jhplum5EMsDzltMg_L_tgoPjr8zzldX6k5uL$T8QHU=#=qaeAZ85IK9icf1hoO$eIUgQ==#=qbDWEs19y0rXNZJloHjyEAXFFSfYqbb6nrn10YnV15GU=#=qgHfmPA2gNKnydwzqeSF_2nVCUjp4Sfb3eJfQd$j975A=#=q3$4$aeeKw0G6KJpmbsHtCSC3$LdCNMfTzWNTjLVfIoU=#=qwJ4w0jkRVthW3ex8w5dly$cWay1Am4JSh9ZTwaXqcz4=#=qZDfXudm0$xsDWCHGELpd5JJQykxvZE2iCT02xHzYWZs=#=qBUViwm1Wzov4U2EcqfWHEYm9yRhCdBkuxxjXALmkpzo=#=qps$_CRy8QN3tD8_cpxbl5Q==#=qeoqI9zQPLOZjV1JthHFzOD41rl7NT5wwztozAPfluxU=#=qfisk2$Joqzyumzd6fh2dOQ==#=qjw6ERKjxRJyhmlKKhTbkm3qZjjnDTqlES7REqNxqUOg=#=qm8f9k1aXVtORA4naJCkxW5anSegBcHo_NtygLkyg$zI=#=qG3u5K_RN
      Source: 4An07Q7I8G.exe, 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 4An07Q7I8G.exe, 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: Yara matchFile source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Windows Management Instrumentation
      1
      Scheduled Task/Job
      112
      Process Injection
      2
      Masquerading
      21
      Input Capture
      11
      Security Software Discovery
      Remote Services21
      Input Capture
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default Accounts1
      Scheduled Task/Job
      Boot or Logon Initialization Scripts1
      Scheduled Task/Job
      1
      Disable or Modify Tools
      LSASS Memory2
      Process Discovery
      Remote Desktop Protocol1
      Archive Collected Data
      Exfiltration Over Bluetooth1
      Non-Standard Port
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
      Virtualization/Sandbox Evasion
      Security Account Manager21
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
      Remote Access Software
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer1
      Non-Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
      Hidden Files and Directories
      LSA Secrets12
      System Information Discovery
      SSHKeyloggingData Transfer Size Limits21
      Application Layer Protocol
      Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common3
      Obfuscated Files or Information
      Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items12
      Software Packing
      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 878387 Sample: 4An07Q7I8G.exe Startdate: 30/05/2023 Architecture: WINDOWS Score: 100 52 jasonbourneblack.ddns.net 2->52 56 Snort IDS alert for network traffic 2->56 58 Multi AV Scanner detection for domain / URL 2->58 60 Found malware configuration 2->60 62 13 other signatures 2->62 9 4An07Q7I8G.exe 3 2->9         started        13 dhcpmon.exe 2->13         started        15 4An07Q7I8G.exe 2 2->15         started        17 dhcpmon.exe 3 2->17         started        signatures3 process4 file5 50 C:\Users\user\AppData\...\4An07Q7I8G.exe.log, ASCII 9->50 dropped 66 Uses schtasks.exe or at.exe to add and modify task schedules 9->66 68 Injects a PE file into a foreign processes 9->68 19 4An07Q7I8G.exe 1 15 9->19         started        24 4An07Q7I8G.exe 9->24         started        26 dhcpmon.exe 13->26         started        28 dhcpmon.exe 13->28         started        30 4An07Q7I8G.exe 2 15->30         started        32 dhcpmon.exe 2 17->32         started        signatures6 process7 dnsIp8 54 jasonbourneblack.ddns.net 141.98.6.167, 4032, 49704, 49705 CMCSUS Germany 19->54 42 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->42 dropped 44 C:\Users\user\AppData\Roaming\...\run.dat, data 19->44 dropped 46 C:\Users\user\AppData\Local\...\tmpA70D.tmp, XML 19->46 dropped 48 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 19->48 dropped 64 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->64 34 schtasks.exe 1 19->34         started        36 schtasks.exe 1 19->36         started        file9 signatures10 process11 process12 38 conhost.exe 34->38         started        40 conhost.exe 36->40         started       

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      4An07Q7I8G.exe24%ReversingLabsWin32.Trojan.Pwsx
      4An07Q7I8G.exe35%VirustotalBrowse
      4An07Q7I8G.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe24%ReversingLabsWin32.Trojan.Pwsx
      No Antivirus matches
      SourceDetectionScannerLabelLink
      jasonbourneblack.ddns.net10%VirustotalBrowse
      SourceDetectionScannerLabelLink
      http://www.galapagosdesign.com/0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.fontbureau.coma0%URL Reputationsafe
      http://en.wikip0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.fontbureau.comm0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.founder.com.cn/cn&0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.founder.com.cn/cn/SCz0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/-0%VirustotalBrowse
      127.0.0.10%Avira URL Cloudsafe
      http://www.fontbureau.comts0%Avira URL Cloudsafe
      http://www.typography.net-t0%Avira URL Cloudsafe
      jasonbourneblack.ddns.net100%Avira URL Cloudmalware
      http://www.galapagosdesign.com/-0%Avira URL Cloudsafe
      http://www.sajatypeworks.comFUw0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      jasonbourneblack.ddns.net
      141.98.6.167
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      jasonbourneblack.ddns.nettrue
      • Avira URL Cloud: malware
      unknown
      127.0.0.1true
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.apache.org/licenses/LICENSE-2.04An07Q7I8G.exe, 00000000.00000003.352081387.0000000006252000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.com4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.fontbureau.com/designersG4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.galapagosdesign.com/4An07Q7I8G.exe, 00000000.00000003.358377438.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.358415531.000000000624D000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers/?4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.founder.com.cn/cn/bThe4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers?4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comts4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361333707.000000000624C000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.tiro.com4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.goodfont.co.kr4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.coma4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361333707.000000000624C000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://en.wikip4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designersN4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://www.carterandcone.coml4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.com4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/-4An07Q7I8G.exe, 00000000.00000003.358467096.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.358377438.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.358415531.000000000624D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.typography.netD4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlN4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/cThe4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htm4An07Q7I8G.exe, 00000000.00000003.358377438.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.com4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/frere-jones.html4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comm4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361333707.000000000624C000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.net-t4An07Q7I8G.exe, 00000000.00000003.349978172.0000000006243000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.galapagosdesign.com/DPlease4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers84An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/SCz4An07Q7I8G.exe, 00000000.00000003.351720872.000000000624A000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.351851946.000000000624A000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fonts.com4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.sandoll.co.kr4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deDPlease4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cn4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn&4An07Q7I8G.exe, 00000000.00000003.351944589.0000000006242000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sakkal.com4An07Q7I8G.exe, 00000000.00000003.354701779.0000000006286000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.354764386.0000000006286000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/4An07Q7I8G.exe, 00000000.00000003.355660959.0000000006286000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.sajatypeworks.comFUw4An07Q7I8G.exe, 00000000.00000003.348952309.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349006793.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349107893.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349149259.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349055971.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.348875232.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349026832.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349081700.0000000006264000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              141.98.6.167
                              jasonbourneblack.ddns.netGermany
                              33657CMCSUStrue
                              Joe Sandbox Version:37.1.0 Beryl
                              Analysis ID:878387
                              Start date and time:2023-05-30 16:38:03 +02:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 12m 51s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:17
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample file name:4An07Q7I8G.exe
                              Original Sample Name:b454c259c82c354cf5375ec490238507.exe
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@22/11@32/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240s for sample files taking high CPU consumption
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                              • TCP Packets have been reduced to 100
                              • Not all processes where analyzed, report is missing behavior information
                              • Report creation exceeded maximum time and may have missing disassembly code information.
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtDeviceIoControlFile calls found.
                              TimeTypeDescription
                              16:39:11API Interceptor1849x Sleep call for process: 4An07Q7I8G.exe modified
                              16:39:16Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\4An07Q7I8G.exe" s>$(Arg0)
                              16:39:16Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                              16:39:18AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              16:39:24API Interceptor2x Sleep call for process: dhcpmon.exe modified
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):782336
                              Entropy (8bit):7.670020600922918
                              Encrypted:false
                              SSDEEP:12288:zPRP2B0xTGlxNqvNu2hZ+nUEsn9iwx241iWKWHy4x7Qm7MFPkhTYZHqX1kEao0JQ:zZPLaVUH999V20iWKW33IPGT0G1kEaTy
                              MD5:B454C259C82C354CF5375EC490238507
                              SHA1:A0A3125C92DF4657053F9001F38749A5D263471F
                              SHA-256:4188FBEF59670A8FA8CEE6A75514DE835973823C58E66F6D5B622C695BD1AD07
                              SHA-512:959685935CD0B6A6BA6A23A2E1BAFF1D1119B5EED401852173EBD0E1A9A6B5A7B350010F27BFB7C1742D11BE01DC84E283BD21F2E64FB1BD33CF3167C7FE654A
                              Malicious:true
                              Antivirus:
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 24%
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...{Sud..............0......P......J.... ........@.. ....................... ............@.....................................O.......<:.............................T............................................ ............... ..H............text...P.... ...................... ..`.rsrc...<:.......@..................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:true
                              Preview:[ZoneTransfer]....ZoneId=0
                              Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1216
                              Entropy (8bit):5.355304211458859
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                              MD5:FED34146BF2F2FA59DCF8702FCC8232E
                              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                              Malicious:true
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1216
                              Entropy (8bit):5.355304211458859
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                              MD5:FED34146BF2F2FA59DCF8702FCC8232E
                              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                              Malicious:false
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                              Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1304
                              Entropy (8bit):5.115647572660457
                              Encrypted:false
                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mSxtn:cbk4oL600QydbQxIYODOLedq3Uj
                              MD5:1DDB387C3D6CBA069AACAB109BD51E64
                              SHA1:8D8BC1D64B435E009B65674A5FC18202976AC4DC
                              SHA-256:9E22400F410B4D6556DA1E47AAC6E740BDDB9BBF54EC672317516D227BC8C05B
                              SHA-512:CC61745804FCF1717A3C71224FF1076351749B0A6D25058A5FA3E9B239C828F8E04D48E963D670E157BF161EA84EBC1D0969E8A987AA299E61DF6F3707E502A0
                              Malicious:true
                              Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                              Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1310
                              Entropy (8bit):5.109425792877704
                              Encrypted:false
                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                              MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                              SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                              SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                              SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                              Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):232
                              Entropy (8bit):7.024371743172393
                              Encrypted:false
                              SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                              MD5:32D0AAE13696FF7F8AF33B2D22451028
                              SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                              SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                              SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                              Malicious:false
                              Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                              Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8
                              Entropy (8bit):2.75
                              Encrypted:false
                              SSDEEP:3:ExC9:V
                              MD5:F5560F152CDF86389BC12DF27D0AB13E
                              SHA1:0AC7E5A1020C73D9E8D5EBB670F4010626D946AD
                              SHA-256:A44CC5DBFA8C587AE50220A2E855BC22372B475375AE594695BF92B55F24C53B
                              SHA-512:C8F181435AF609BDD45423E2AB74589A0F54393F682A1341E506966E2C0598A3650CC730EBC408F4D97D4481ADB74F13E33745CFDB70D342B03CC60B1FAAE938
                              Malicious:true
                              Preview:k{g.ga.H
                              Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                              File Type:data
                              Category:modified
                              Size (bytes):40
                              Entropy (8bit):5.153055907333276
                              Encrypted:false
                              SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                              MD5:4E5E92E2369688041CC82EF9650EDED2
                              SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                              SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                              SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                              Malicious:false
                              Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                              Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):327432
                              Entropy (8bit):7.99938831605763
                              Encrypted:true
                              SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                              MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                              SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                              SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                              SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                              Malicious:false
                              Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                              Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):41
                              Entropy (8bit):4.39146321255865
                              Encrypted:false
                              SSDEEP:3:oN0naRRRkL40SsdiLAC:oNcSRCQsgLN
                              MD5:BD43240CB9E3E459B9C2985C27CB8FAB
                              SHA1:AC9A4D13C5BE671980909A49E420A9D1C7000514
                              SHA-256:47371587121EA0B8D8246C94BC5FA50C31FBF1361F7AAFB357501C00AF670F94
                              SHA-512:F96A8ED5804BDB9B1DC4D318825F67CA634FD31DC7AC7858F20E6553B08FB38C28F43CB09A50D8B23C507F47A9D687D045D8E6F24A3CEEC90464D0C3E77D6574
                              Malicious:false
                              Preview:C:\Users\user\Desktop\4An07Q7I8G.exe
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.670020600922918
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                              • Win32 Executable (generic) a (10002005/4) 49.78%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Win16/32 Executable Delphi generic (2074/23) 0.01%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              File name:4An07Q7I8G.exe
                              File size:782336
                              MD5:b454c259c82c354cf5375ec490238507
                              SHA1:a0a3125c92df4657053f9001f38749a5d263471f
                              SHA256:4188fbef59670a8fa8cee6a75514de835973823c58e66f6d5b622c695bd1ad07
                              SHA512:959685935cd0b6a6ba6a23a2e1baff1d1119b5eed401852173ebd0e1a9a6b5a7b350010f27bfb7c1742d11be01dc84e283bd21f2e64fb1bd33cf3167c7fe654a
                              SSDEEP:12288:zPRP2B0xTGlxNqvNu2hZ+nUEsn9iwx241iWKWHy4x7Qm7MFPkhTYZHqX1kEao0JQ:zZPLaVUH999V20iWKW33IPGT0G1kEaTy
                              TLSH:55F422287B57802FD5831BB408D87B7560FD82DAB872E7231E5792D9DB6BF096802317
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...{Sud..............0......P......J.... ........@.. ....................... ............@................................
                              Icon Hash:94969edbd9f8d9c6
                              Entrypoint:0x4ba54a
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x6475537B [Tue May 30 01:38:03 2023 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xba4f80x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xbc0000x3a3c.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xc00000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0xb94c80x54.text
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000xb85500xb9000False0.9298313450168919data7.701181340859135IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0xbc0000x3a3c0x4000False0.8494873046875data7.3969246343448285IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xc00000xc0x1000False0.0087890625data0.016408464515625623IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_ICON0xbc0c80x36fdPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                              RT_GROUP_ICON0xbf7d80x14data
                              RT_VERSION0xbf7fc0x23cdata
                              DLLImport
                              mscoree.dll_CorExeMain
                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              192.168.2.7141.98.6.1674971040322816718 05/30/23-16:40:13.977539TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497104032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674970540322816766 05/30/23-16:39:33.706408TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497054032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674971540322816766 05/30/23-16:40:50.973824TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497154032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674971840322816766 05/30/23-16:41:18.114338TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497184032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674972140322816766 05/30/23-16:41:38.417178TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497214032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674972740322816718 05/30/23-16:42:22.509655TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497274032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674970840322816766 05/30/23-16:40:00.413491TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497084032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674971140322816766 05/30/23-16:40:21.553606TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497114032192.168.2.7141.98.6.167
                              141.98.6.167192.168.2.74032497252841753 05/30/23-16:42:09.874096TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)403249725141.98.6.167192.168.2.7
                              192.168.2.7141.98.6.1674971740322816718 05/30/23-16:41:08.713034TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497174032192.168.2.7141.98.6.167
                              141.98.6.167192.168.2.74032497212810290 05/30/23-16:41:38.152963TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 1403249721141.98.6.167192.168.2.7
                              141.98.6.167192.168.2.74032497312841753 05/30/23-16:42:49.623506TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)403249731141.98.6.167192.168.2.7
                              141.98.6.167192.168.2.74032497332841753 05/30/23-16:43:01.178074TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)403249733141.98.6.167192.168.2.7
                              192.168.2.7141.98.6.1674972240322816766 05/30/23-16:41:46.251062TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497224032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674970640322816766 05/30/23-16:39:46.341150TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497064032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674971240322816766 05/30/23-16:40:27.702458TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497124032192.168.2.7141.98.6.167
                              141.98.6.167192.168.2.74032497072810290 05/30/23-16:39:52.215019TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 1403249707141.98.6.167192.168.2.7
                              192.168.2.7141.98.6.1674970740322816766 05/30/23-16:39:52.717055TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497074032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674971640322816766 05/30/23-16:41:00.324127TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497164032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674972640322816766 05/30/23-16:42:16.962875TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497264032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674973240322816766 05/30/23-16:42:56.061988TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497324032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674972340322816766 05/30/23-16:41:55.674302TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497234032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674971340322816766 05/30/23-16:40:34.783339TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497134032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674971040322816766 05/30/23-16:40:14.977403TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497104032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674971740322816766 05/30/23-16:41:08.713034TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497174032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674972740322816766 05/30/23-16:42:23.748746TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497274032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674970440322816766 05/30/23-16:39:25.146472TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497044032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674971940322816766 05/30/23-16:41:24.254865TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497194032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674971440322816766 05/30/23-16:40:42.455969TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497144032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674970940322816766 05/30/23-16:40:08.035340TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497094032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674972040322816766 05/30/23-16:41:31.469338TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497204032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674972440322816766 05/30/23-16:42:04.621976TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497244032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674973040322816766 05/30/23-16:42:44.464795TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497304032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674972840322816766 05/30/23-16:42:31.313902TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497284032192.168.2.7141.98.6.167
                              192.168.2.7141.98.6.1674973440322816766 05/30/23-16:43:07.123160TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497344032192.168.2.7141.98.6.167
                              TimestampSource PortDest PortSource IPDest IP
                              May 30, 2023 16:39:22.476109982 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:22.503236055 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:22.503346920 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:22.857084036 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:22.934726954 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:22.956017017 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:22.999768019 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.031047106 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.143770933 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.223859072 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.285304070 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.285352945 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.285381079 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.285412073 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.285414934 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.285468102 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.317507029 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.317559004 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.317723989 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.350073099 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.379556894 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.379605055 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.379625082 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.379645109 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.379682064 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.379728079 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.379739046 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.379745960 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.379748106 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.379757881 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.379801035 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.379825115 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.408036947 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.408082008 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.408102036 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.408109903 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.408127069 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.408138990 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.408157110 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.408157110 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.408170938 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.408216000 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.408308983 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.434542894 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.434588909 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.434614897 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.434638977 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.434649944 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.434663057 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.434695005 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.461402893 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.461447001 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.461464882 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.461474895 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.461499929 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.461512089 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.461528063 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.461565971 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.488554955 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.488667011 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.488687992 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.488706112 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.488725901 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.488734961 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.488745928 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.488759041 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.488765001 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.488782883 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.515285015 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.515317917 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.515336037 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.515350103 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.515362978 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.515382051 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.515399933 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.515427113 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.515456915 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.541888952 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.541934013 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.541963100 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.541990042 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.541990995 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.542016983 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.542037010 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.542068005 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.542093992 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.542109966 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.542129993 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.542179108 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.569458961 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.569509983 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.569547892 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.569580078 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.569582939 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.569618940 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.569627047 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.569664955 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.569695950 CEST403249704141.98.6.167192.168.2.7
                              May 30, 2023 16:39:23.569700003 CEST497044032192.168.2.7141.98.6.167
                              May 30, 2023 16:39:23.569727898 CEST403249704141.98.6.167192.168.2.7
                              TimestampSource PortDest PortSource IPDest IP
                              May 30, 2023 16:39:22.362440109 CEST5050553192.168.2.78.8.8.8
                              May 30, 2023 16:39:22.397989988 CEST53505058.8.8.8192.168.2.7
                              May 30, 2023 16:39:32.605612040 CEST6117853192.168.2.78.8.8.8
                              May 30, 2023 16:39:32.632709026 CEST53611788.8.8.8192.168.2.7
                              May 30, 2023 16:39:44.354666948 CEST6392653192.168.2.78.8.8.8
                              May 30, 2023 16:39:44.381418943 CEST53639268.8.8.8192.168.2.7
                              May 30, 2023 16:39:51.504729986 CEST5333653192.168.2.78.8.8.8
                              May 30, 2023 16:39:51.524482012 CEST53533368.8.8.8192.168.2.7
                              May 30, 2023 16:39:59.729190111 CEST5100753192.168.2.78.8.8.8
                              May 30, 2023 16:39:59.757992983 CEST53510078.8.8.8192.168.2.7
                              May 30, 2023 16:40:05.948673964 CEST5051353192.168.2.78.8.8.8
                              May 30, 2023 16:40:05.983731985 CEST53505138.8.8.8192.168.2.7
                              May 30, 2023 16:40:13.588737011 CEST6076553192.168.2.78.8.8.8
                              May 30, 2023 16:40:13.617819071 CEST53607658.8.8.8192.168.2.7
                              May 30, 2023 16:40:20.004285097 CEST5828353192.168.2.78.8.8.8
                              May 30, 2023 16:40:20.033102036 CEST53582838.8.8.8192.168.2.7
                              May 30, 2023 16:40:26.547569990 CEST5002453192.168.2.78.8.8.8
                              May 30, 2023 16:40:26.576658964 CEST53500248.8.8.8192.168.2.7
                              May 30, 2023 16:40:33.111949921 CEST4951653192.168.2.78.8.8.8
                              May 30, 2023 16:40:33.140515089 CEST53495168.8.8.8192.168.2.7
                              May 30, 2023 16:40:40.637732029 CEST6267953192.168.2.78.8.8.8
                              May 30, 2023 16:40:40.672013998 CEST53626798.8.8.8192.168.2.7
                              May 30, 2023 16:40:48.904197931 CEST6139253192.168.2.78.8.8.8
                              May 30, 2023 16:40:48.938972950 CEST53613928.8.8.8192.168.2.7
                              May 30, 2023 16:40:58.416053057 CEST5210453192.168.2.78.8.8.8
                              May 30, 2023 16:40:58.444981098 CEST53521048.8.8.8192.168.2.7
                              May 30, 2023 16:41:06.952166080 CEST6535653192.168.2.78.8.8.8
                              May 30, 2023 16:41:06.980006933 CEST53653568.8.8.8192.168.2.7
                              May 30, 2023 16:41:14.907988071 CEST5900653192.168.2.78.8.8.8
                              May 30, 2023 16:41:14.936583042 CEST53590068.8.8.8192.168.2.7
                              May 30, 2023 16:41:23.494816065 CEST5152653192.168.2.78.8.8.8
                              May 30, 2023 16:41:23.529709101 CEST53515268.8.8.8192.168.2.7
                              May 30, 2023 16:41:29.957299948 CEST5113953192.168.2.78.8.8.8
                              May 30, 2023 16:41:29.972347975 CEST53511398.8.8.8192.168.2.7
                              May 30, 2023 16:41:37.741357088 CEST5878453192.168.2.78.8.8.8
                              May 30, 2023 16:41:37.776343107 CEST53587848.8.8.8192.168.2.7
                              May 30, 2023 16:41:44.572515011 CEST5797053192.168.2.78.8.8.8
                              May 30, 2023 16:41:44.593158960 CEST53579708.8.8.8192.168.2.7
                              May 30, 2023 16:41:52.146033049 CEST6460853192.168.2.78.8.8.8
                              May 30, 2023 16:41:52.180840969 CEST53646088.8.8.8192.168.2.7
                              May 30, 2023 16:42:03.454895973 CEST5874653192.168.2.78.8.8.8
                              May 30, 2023 16:42:03.474879026 CEST53587468.8.8.8192.168.2.7
                              May 30, 2023 16:42:09.789836884 CEST6243353192.168.2.78.8.8.8
                              May 30, 2023 16:42:09.810009956 CEST53624338.8.8.8192.168.2.7
                              May 30, 2023 16:42:15.086165905 CEST6124853192.168.2.78.8.8.8
                              May 30, 2023 16:42:15.122503996 CEST53612488.8.8.8192.168.2.7
                              May 30, 2023 16:42:22.159080982 CEST5275053192.168.2.78.8.8.8
                              May 30, 2023 16:42:22.179284096 CEST53527508.8.8.8192.168.2.7
                              May 30, 2023 16:42:29.186521053 CEST6407853192.168.2.78.8.8.8
                              May 30, 2023 16:42:29.221518040 CEST53640788.8.8.8192.168.2.7
                              May 30, 2023 16:42:36.934360027 CEST5023153192.168.2.78.8.8.8
                              May 30, 2023 16:42:36.960967064 CEST53502318.8.8.8192.168.2.7
                              May 30, 2023 16:42:43.045001984 CEST5851453192.168.2.78.8.8.8
                              May 30, 2023 16:42:43.072479010 CEST53585148.8.8.8192.168.2.7
                              May 30, 2023 16:42:49.527162075 CEST5143653192.168.2.78.8.8.8
                              May 30, 2023 16:42:49.555417061 CEST53514368.8.8.8192.168.2.7
                              May 30, 2023 16:42:54.530867100 CEST5905353192.168.2.78.8.8.8
                              May 30, 2023 16:42:54.559801102 CEST53590538.8.8.8192.168.2.7
                              May 30, 2023 16:43:01.091682911 CEST5194553192.168.2.78.8.8.8
                              May 30, 2023 16:43:01.120343924 CEST53519458.8.8.8192.168.2.7
                              May 30, 2023 16:43:06.156100035 CEST6318753192.168.2.78.8.8.8
                              May 30, 2023 16:43:06.191737890 CEST53631878.8.8.8192.168.2.7
                              May 30, 2023 16:43:12.186599016 CEST6476053192.168.2.78.8.8.8
                              May 30, 2023 16:43:12.201931953 CEST53647608.8.8.8192.168.2.7
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              May 30, 2023 16:39:22.362440109 CEST192.168.2.78.8.8.80xf453Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:39:32.605612040 CEST192.168.2.78.8.8.80x5e7eStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:39:44.354666948 CEST192.168.2.78.8.8.80xa8f2Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:39:51.504729986 CEST192.168.2.78.8.8.80xae94Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:39:59.729190111 CEST192.168.2.78.8.8.80x338aStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:40:05.948673964 CEST192.168.2.78.8.8.80x8320Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:40:13.588737011 CEST192.168.2.78.8.8.80x3578Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:40:20.004285097 CEST192.168.2.78.8.8.80xd4deStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:40:26.547569990 CEST192.168.2.78.8.8.80xe4f9Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:40:33.111949921 CEST192.168.2.78.8.8.80xd2feStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:40:40.637732029 CEST192.168.2.78.8.8.80x8d6eStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:40:48.904197931 CEST192.168.2.78.8.8.80x24e7Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:40:58.416053057 CEST192.168.2.78.8.8.80x8d7bStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:41:06.952166080 CEST192.168.2.78.8.8.80xff49Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:41:14.907988071 CEST192.168.2.78.8.8.80x43f4Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:41:23.494816065 CEST192.168.2.78.8.8.80x71baStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:41:29.957299948 CEST192.168.2.78.8.8.80x135eStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:41:37.741357088 CEST192.168.2.78.8.8.80x668bStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:41:44.572515011 CEST192.168.2.78.8.8.80xeba5Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:41:52.146033049 CEST192.168.2.78.8.8.80xf4e8Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:42:03.454895973 CEST192.168.2.78.8.8.80x7d3bStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:42:09.789836884 CEST192.168.2.78.8.8.80xf20Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:42:15.086165905 CEST192.168.2.78.8.8.80x4758Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:42:22.159080982 CEST192.168.2.78.8.8.80xe248Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:42:29.186521053 CEST192.168.2.78.8.8.80x1496Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:42:36.934360027 CEST192.168.2.78.8.8.80xf282Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:42:43.045001984 CEST192.168.2.78.8.8.80xa5c9Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:42:49.527162075 CEST192.168.2.78.8.8.80x7be4Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:42:54.530867100 CEST192.168.2.78.8.8.80x4051Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:43:01.091682911 CEST192.168.2.78.8.8.80xf734Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:43:06.156100035 CEST192.168.2.78.8.8.80xdbc4Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              May 30, 2023 16:43:12.186599016 CEST192.168.2.78.8.8.80x622aStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              May 30, 2023 16:39:22.397989988 CEST8.8.8.8192.168.2.70xf453No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:39:32.632709026 CEST8.8.8.8192.168.2.70x5e7eNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:39:44.381418943 CEST8.8.8.8192.168.2.70xa8f2No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:39:51.524482012 CEST8.8.8.8192.168.2.70xae94No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:39:59.757992983 CEST8.8.8.8192.168.2.70x338aNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:40:05.983731985 CEST8.8.8.8192.168.2.70x8320No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:40:13.617819071 CEST8.8.8.8192.168.2.70x3578No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:40:20.033102036 CEST8.8.8.8192.168.2.70xd4deNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:40:26.576658964 CEST8.8.8.8192.168.2.70xe4f9No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:40:33.140515089 CEST8.8.8.8192.168.2.70xd2feNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:40:40.672013998 CEST8.8.8.8192.168.2.70x8d6eNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:40:48.938972950 CEST8.8.8.8192.168.2.70x24e7No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:40:58.444981098 CEST8.8.8.8192.168.2.70x8d7bNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:41:06.980006933 CEST8.8.8.8192.168.2.70xff49No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:41:14.936583042 CEST8.8.8.8192.168.2.70x43f4No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:41:23.529709101 CEST8.8.8.8192.168.2.70x71baNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:41:29.972347975 CEST8.8.8.8192.168.2.70x135eNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:41:37.776343107 CEST8.8.8.8192.168.2.70x668bNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:41:44.593158960 CEST8.8.8.8192.168.2.70xeba5No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:41:52.180840969 CEST8.8.8.8192.168.2.70xf4e8No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:42:03.474879026 CEST8.8.8.8192.168.2.70x7d3bNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:42:09.810009956 CEST8.8.8.8192.168.2.70xf20No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:42:15.122503996 CEST8.8.8.8192.168.2.70x4758No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:42:22.179284096 CEST8.8.8.8192.168.2.70xe248No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:42:29.221518040 CEST8.8.8.8192.168.2.70x1496No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:42:36.960967064 CEST8.8.8.8192.168.2.70xf282No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:42:43.072479010 CEST8.8.8.8192.168.2.70xa5c9No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:42:49.555417061 CEST8.8.8.8192.168.2.70x7be4No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:42:54.559801102 CEST8.8.8.8192.168.2.70x4051No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:43:01.120343924 CEST8.8.8.8192.168.2.70xf734No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:43:06.191737890 CEST8.8.8.8192.168.2.70xdbc4No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                              May 30, 2023 16:43:12.201931953 CEST8.8.8.8192.168.2.70x622aNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false

                              Click to jump to process

                              Target ID:0
                              Start time:16:39:04
                              Start date:30/05/2023
                              Path:C:\Users\user\Desktop\4An07Q7I8G.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\4An07Q7I8G.exe
                              Imagebase:0xf50000
                              File size:782336 bytes
                              MD5 hash:B454C259C82C354CF5375EC490238507
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                              Reputation:low

                              Target ID:1
                              Start time:16:39:13
                              Start date:30/05/2023
                              Path:C:\Users\user\Desktop\4An07Q7I8G.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\4An07Q7I8G.exe
                              Imagebase:0x230000
                              File size:782336 bytes
                              MD5 hash:B454C259C82C354CF5375EC490238507
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              Target ID:2
                              Start time:16:39:13
                              Start date:30/05/2023
                              Path:C:\Users\user\Desktop\4An07Q7I8G.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\4An07Q7I8G.exe
                              Imagebase:0xd80000
                              File size:782336 bytes
                              MD5 hash:B454C259C82C354CF5375EC490238507
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000003.388393335.0000000006B6F000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              Reputation:low

                              Target ID:3
                              Start time:16:39:15
                              Start date:30/05/2023
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp
                              Imagebase:0x360000
                              File size:185856 bytes
                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:4
                              Start time:16:39:15
                              Start date:30/05/2023
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6edaf0000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:5
                              Start time:16:39:16
                              Start date:30/05/2023
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA8D3.tmp
                              Imagebase:0x360000
                              File size:185856 bytes
                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:6
                              Start time:16:39:16
                              Start date:30/05/2023
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6edaf0000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:7
                              Start time:16:39:16
                              Start date:30/05/2023
                              Path:C:\Users\user\Desktop\4An07Q7I8G.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\4An07Q7I8G.exe 0
                              Imagebase:0x820000
                              File size:782336 bytes
                              MD5 hash:B454C259C82C354CF5375EC490238507
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:low

                              Target ID:8
                              Start time:16:39:17
                              Start date:30/05/2023
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                              Imagebase:0x100000
                              File size:782336 bytes
                              MD5 hash:B454C259C82C354CF5375EC490238507
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Antivirus matches:
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 24%, ReversingLabs
                              Reputation:low

                              Target ID:9
                              Start time:16:39:26
                              Start date:30/05/2023
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Imagebase:0xce0000
                              File size:782336 bytes
                              MD5 hash:B454C259C82C354CF5375EC490238507
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000009.00000002.421527210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                              Reputation:low

                              Target ID:10
                              Start time:16:39:26
                              Start date:30/05/2023
                              Path:C:\Users\user\Desktop\4An07Q7I8G.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\4An07Q7I8G.exe
                              Imagebase:0xb60000
                              File size:782336 bytes
                              MD5 hash:B454C259C82C354CF5375EC490238507
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                              Target ID:11
                              Start time:16:39:27
                              Start date:30/05/2023
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                              Imagebase:0x160000
                              File size:782336 bytes
                              MD5 hash:B454C259C82C354CF5375EC490238507
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:.Net C# or VB.NET

                              Target ID:12
                              Start time:16:39:35
                              Start date:30/05/2023
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Imagebase:0x390000
                              File size:782336 bytes
                              MD5 hash:B454C259C82C354CF5375EC490238507
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language

                              Target ID:13
                              Start time:16:39:35
                              Start date:30/05/2023
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Imagebase:0xcd0000
                              File size:782336 bytes
                              MD5 hash:B454C259C82C354CF5375EC490238507
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:.Net C# or VB.NET

                              No disassembly