Source: Yara match | File source: 00000000.00000002.245819001.000000000416B000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000002.604237301.0000000005CB0000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000002.603472332.00000000048E8000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.243301800.0000000003CE1000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000002.595481599.0000000000402000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: RegSvcs.exe PID: 5420, type: MEMORY |
Source: Yara match | File source: Process Memory Space: parcel_images.exe PID: 6068, type: MEMORY |
Source: Yara match | File source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.RegSvcs.exe.5cb0000.5.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.RegSvcs.exe.5cb0000.5.raw.unpack, type: UNPACKEDPE |
Source: | Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: RegSvcs.exe, 00000004.00000002.603472332.00000000048E8000.00000004.00000001.sdmp |
Source: | Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.pdb source: RegSvcs.exe, 00000004.00000002.599613900.0000000003565000.00000004.00000040.sdmp |
Source: | Binary string: System.EnterpriseServices.Wrapper.pdb source: dhcpmon.exe, 0000000B.00000002.258862329.0000000005360000.00000002.00000001.sdmp |
Source: | Binary string: indows\mscorlib.pdbpdblib.pdb source: RegSvcs.exe, 00000004.00000002.599613900.0000000003565000.00000004.00000040.sdmp |
Source: | Binary string: indows\RegSvcs.pdbpdbvcs.pdb source: RegSvcs.exe, 00000004.00000002.599613900.0000000003565000.00000004.00000040.sdmp |
Source: | Binary string: C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000004.00000002.599613900.0000000003565000.00000004.00000040.sdmp |
Source: | Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe.4.dr |
Source: | Binary string: mscorrc.pdb source: parcel_images.exe, 00000000.00000002.253906839.0000000006AC0000.00000002.00000001.sdmp, RegSvcs.exe, 00000004.00000002.604432852.0000000006120000.00000002.00000001.sdmp, RegSvcs.exe, 00000009.00000002.255719251.0000000005290000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.259020078.0000000005400000.00000002.00000001.sdmp |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://fontfabrik.com |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.carterandcone.coml |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com |
Source: parcel_images.exe, 00000000.00000003.222434128.000000000506D000.00000004.00000001.sdmp, parcel_images.exe, 00000000.00000003.221895972.0000000005068000.00000004.00000001.sdmp, parcel_images.exe, 00000000.00000003.221943311.0000000005069000.00000004.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/? |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers8 |
Source: parcel_images.exe, 00000000.00000003.221943311.0000000005069000.00000004.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers: |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers? |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designersG |
Source: parcel_images.exe, 00000000.00000002.246216893.0000000005060000.00000004.00000001.sdmp | String found in binary or memory: http://www.fontbureau.comFP |
Source: parcel_images.exe, 00000000.00000002.246216893.0000000005060000.00000004.00000001.sdmp | String found in binary or memory: http://www.fontbureau.coml1 |
Source: parcel_images.exe, 00000000.00000003.216620193.000000000507B000.00000004.00000001.sdmp | String found in binary or memory: http://www.fonts.com |
Source: parcel_images.exe, 00000000.00000003.216620193.000000000507B000.00000004.00000001.sdmp | String found in binary or memory: http://www.fonts.comh |
Source: parcel_images.exe, 00000000.00000003.216665590.000000000507B000.00000004.00000001.sdmp | String found in binary or memory: http://www.fonts.comic |
Source: parcel_images.exe, 00000000.00000003.218388349.0000000005064000.00000004.00000001.sdmp | String found in binary or memory: http://www.founder.c |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn |
Source: parcel_images.exe, 00000000.00000003.218388349.0000000005064000.00000004.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/ |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/bThe |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/cThe |
Source: parcel_images.exe, 00000000.00000003.218388349.0000000005064000.00000004.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/e |
Source: parcel_images.exe, 00000000.00000003.218064819.000000000509D000.00000004.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cnl-n |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.galapagosdesign.com/DPlease |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.goodfont.co.kr |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp, parcel_images.exe, 00000000.00000003.219725000.0000000005064000.00000004.00000001.sdmp | String found in binary or memory: http://www.jiyu-kobo.co.jp/ |
Source: parcel_images.exe, 00000000.00000003.219725000.0000000005064000.00000004.00000001.sdmp | String found in binary or memory: http://www.jiyu-kobo.co.jp/O |
Source: parcel_images.exe, 00000000.00000003.219725000.0000000005064000.00000004.00000001.sdmp | String found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/ |
Source: parcel_images.exe, 00000000.00000003.219725000.0000000005064000.00000004.00000001.sdmp | String found in binary or memory: http://www.jiyu-kobo.co.jp/Y0a |
Source: parcel_images.exe, 00000000.00000003.219725000.0000000005064000.00000004.00000001.sdmp | String found in binary or memory: http://www.jiyu-kobo.co.jp/jp/ |
Source: parcel_images.exe, 00000000.00000003.219725000.0000000005064000.00000004.00000001.sdmp | String found in binary or memory: http://www.jiyu-kobo.co.jp/jp/F |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.sajatypeworks.com |
Source: parcel_images.exe, 00000000.00000003.216620193.000000000507B000.00000004.00000001.sdmp | String found in binary or memory: http://www.sajatypeworks.compe |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.sakkal.com |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.sandoll.co.kr |
Source: parcel_images.exe, 00000000.00000003.217510313.0000000005069000.00000004.00000001.sdmp | String found in binary or memory: http://www.sandoll.co.krC |
Source: parcel_images.exe, 00000000.00000003.217510313.0000000005069000.00000004.00000001.sdmp | String found in binary or memory: http://www.sandoll.co.krlearn |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.tiro.com |
Source: parcel_images.exe, 00000000.00000003.216945664.000000000507B000.00000004.00000001.sdmp | String found in binary or memory: http://www.tiro.comF |
Source: parcel_images.exe, 00000000.00000003.216900726.000000000507B000.00000004.00000001.sdmp | String found in binary or memory: http://www.tiro.comw |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.typography.netD |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.urwpp.deDPlease |
Source: parcel_images.exe, 00000000.00000002.246509480.00000000051D0000.00000002.00000001.sdmp | String found in binary or memory: http://www.zhongyicts.com.cn |
Source: Yara match | File source: 00000000.00000002.245819001.000000000416B000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000002.604237301.0000000005CB0000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000002.603472332.00000000048E8000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.243301800.0000000003CE1000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000002.595481599.0000000000402000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: RegSvcs.exe PID: 5420, type: MEMORY |
Source: Yara match | File source: Process Memory Space: parcel_images.exe PID: 6068, type: MEMORY |
Source: Yara match | File source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.RegSvcs.exe.5cb0000.5.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.RegSvcs.exe.5cb0000.5.raw.unpack, type: UNPACKEDPE |
Source: 00000004.00000002.604092435.0000000005B00000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: 00000000.00000002.245819001.000000000416B000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: 00000000.00000002.245819001.000000000416B000.00000004.00000001.sdmp, type: MEMORY | Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net> |
Source: 00000004.00000002.604237301.0000000005CB0000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: 00000004.00000002.603472332.00000000048E8000.00000004.00000001.sdmp, type: MEMORY | Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net> |
Source: 00000000.00000002.243301800.0000000003CE1000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: 00000000.00000002.243301800.0000000003CE1000.00000004.00000001.sdmp, type: MEMORY | Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net> |
Source: 00000004.00000002.604208395.0000000005CA0000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: 00000004.00000002.595481599.0000000000402000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: 00000004.00000002.595481599.0000000000402000.00000040.00000001.sdmp, type: MEMORY | Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net> |
Source: Process Memory Space: RegSvcs.exe PID: 5420, type: MEMORY | Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: Process Memory Space: RegSvcs.exe PID: 5420, type: MEMORY | Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net> |
Source: Process Memory Space: parcel_images.exe PID: 6068, type: MEMORY | Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: Process Memory Space: parcel_images.exe PID: 6068, type: MEMORY | Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net> |
Source: 4.2.RegSvcs.exe.5ca0000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: 4.2.RegSvcs.exe.5b00000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net> |
Source: 4.2.RegSvcs.exe.5cb0000.5.unpack, type: UNPACKEDPE | Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: 4.2.RegSvcs.exe.5cb0000.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01000C50 | 0_2_01000C50 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01001C53 | 0_2_01001C53 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_010000F8 | 0_2_010000F8 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01002B08 | 0_2_01002B08 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01001374 | 0_2_01001374 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_0100454C | 0_2_0100454C |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01003800 | 0_2_01003800 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01004848 | 0_2_01004848 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01000C4D | 0_2_01000C4D |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01004858 | 0_2_01004858 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01004CA4 | 0_2_01004CA4 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01004CA8 | 0_2_01004CA8 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01002B01 | 0_2_01002B01 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01002F18 | 0_2_01002F18 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_010037F8 | 0_2_010037F8 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01004A55 | 0_2_01004A55 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01004E55 | 0_2_01004E55 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01004A58 | 0_2_01004A58 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01004291 | 0_2_01004291 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01004298 | 0_2_01004298 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01002AA5 | 0_2_01002AA5 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_0681208C | 0_2_0681208C |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06810D90 | 0_2_06810D90 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06810530 | 0_2_06810530 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_0681AC65 | 0_2_0681AC65 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06810D82 | 0_2_06810D82 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_068105F0 | 0_2_068105F0 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06F8CC20 | 0_2_06F8CC20 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06F8E120 | 0_2_06F8E120 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06F8C500 | 0_2_06F8C500 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06F8B0E8 | 0_2_06F8B0E8 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06F8CEA8 | 0_2_06F8CEA8 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06F8BC98 | 0_2_06F8BC98 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06F8DE78 | 0_2_06F8DE78 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06F8A250 | 0_2_06F8A250 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06F8A9F8 | 0_2_06F8A9F8 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06F8B728 | 0_2_06F8B728 |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_01902477 | 4_2_01902477 |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_01917ABE | 4_2_01917ABE |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_03492FA8 | 4_2_03492FA8 |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_034923A0 | 4_2_034923A0 |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_03498BB8 | 4_2_03498BB8 |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_034997B8 | 4_2_034997B8 |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_03499ACB | 4_2_03499ACB |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_03493850 | 4_2_03493850 |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_0349B488 | 4_2_0349B488 |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_034932BB | 4_2_034932BB |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_0349306F | 4_2_0349306F |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_0349A060 | 4_2_0349A060 |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_0349987F | 4_2_0349987F |
Source: parcel_images.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: parcel_images.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: parcel_images.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: parcel_images.exe | Static PE information: Resource name: RT_GROUP_ICON type: GLS_BINARY_LSB_FIRST |
Source: kWLVXBfTFQKW.exe.0.dr | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: kWLVXBfTFQKW.exe.0.dr | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: kWLVXBfTFQKW.exe.0.dr | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: kWLVXBfTFQKW.exe.0.dr | Static PE information: Resource name: RT_GROUP_ICON type: GLS_BINARY_LSB_FIRST |
Source: parcel_images.exe | Binary or memory string: OriginalFilename vs parcel_images.exe |
Source: parcel_images.exe, 00000000.00000002.240637309.0000000000517000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameG vs parcel_images.exe |
Source: parcel_images.exe, 00000000.00000002.253906839.0000000006AC0000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamemscorrc.dllT vs parcel_images.exe |
Source: parcel_images.exe, 00000000.00000002.245931889.0000000004E70000.00000004.00000001.sdmp | Binary or memory string: OriginalFilenameTypeLibImporterFlags.dll4 vs parcel_images.exe |
Source: parcel_images.exe, 00000000.00000002.254340963.0000000006F40000.00000002.00000001.sdmp | Binary or memory string: originalfilename vs parcel_images.exe |
Source: parcel_images.exe, 00000000.00000002.254340963.0000000006F40000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamepropsys.dll.mui@ vs parcel_images.exe |
Source: parcel_images.exe, 00000000.00000002.254894264.0000000007340000.00000002.00000001.sdmp | Binary or memory string: System.OriginalFileName vs parcel_images.exe |
Source: parcel_images.exe, 00000000.00000002.253585075.0000000006820000.00000004.00000001.sdmp | Binary or memory string: OriginalFilenameAssemblyReferenceEntry.exeD vs parcel_images.exe |
Source: parcel_images.exe | Binary or memory string: OriginalFilenameG vs parcel_images.exe |
Source: 00000004.00000002.604092435.0000000005B00000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: 00000004.00000002.604092435.0000000005B00000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.245819001.000000000416B000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: 00000000.00000002.245819001.000000000416B000.00000004.00000001.sdmp, type: MEMORY | Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore |
Source: 00000004.00000002.604237301.0000000005CB0000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: 00000004.00000002.604237301.0000000005CB0000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000004.00000002.603472332.00000000048E8000.00000004.00000001.sdmp, type: MEMORY | Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore |
Source: 00000000.00000002.243301800.0000000003CE1000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: 00000000.00000002.243301800.0000000003CE1000.00000004.00000001.sdmp, type: MEMORY | Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore |
Source: 00000004.00000002.604208395.0000000005CA0000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: 00000004.00000002.604208395.0000000005CA0000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000004.00000002.595481599.0000000000402000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: 00000004.00000002.595481599.0000000000402000.00000040.00000001.sdmp, type: MEMORY | Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore |
Source: Process Memory Space: RegSvcs.exe PID: 5420, type: MEMORY | Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: Process Memory Space: RegSvcs.exe PID: 5420, type: MEMORY | Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore |
Source: Process Memory Space: parcel_images.exe PID: 6068, type: MEMORY | Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: Process Memory Space: parcel_images.exe PID: 6068, type: MEMORY | Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore |
Source: 4.2.RegSvcs.exe.5ca0000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: 4.2.RegSvcs.exe.5ca0000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 4.2.RegSvcs.exe.5b00000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: 4.2.RegSvcs.exe.5b00000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore |
Source: 4.2.RegSvcs.exe.5cb0000.5.unpack, type: UNPACKEDPE | Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: 4.2.RegSvcs.exe.5cb0000.5.unpack, type: UNPACKEDPE | Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 4.2.RegSvcs.exe.5cb0000.5.raw.unpack, type: UNPACKEDPE | Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: 4.2.RegSvcs.exe.5cb0000.5.raw.unpack, type: UNPACKEDPE | Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5736:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4712:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:720:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5376:120:WilError_01 |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Mutant created: \Sessions\1\BaseNamedObjects\Global\{0c1e37c4-6fe0-4fbd-a4f4-dbf4c0453c4a} |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Mutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5620:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5384:120:WilError_01 |
Source: C:\Users\user\Desktop\parcel_images.exe | Mutant created: \Sessions\1\BaseNamedObjects\btYicyWOySdNftvOgyOAHWI |
Source: C:\Users\user\Desktop\parcel_images.exe | Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp | Jump to behavior |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll | Jump to behavior |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp | Jump to behavior |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp | Jump to behavior |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll | Jump to behavior |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp | Jump to behavior |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp | Jump to behavior |
Source: unknown | Process created: C:\Users\user\Desktop\parcel_images.exe 'C:\Users\user\Desktop\parcel_images.exe' | |
Source: unknown | Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\kWLVXBfTFQKW' /XML 'C:\Users\user\AppData\Local\Temp\tmp2412.tmp' | |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe {path} | |
Source: unknown | Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpB461.tmp' | |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpB81B.tmp' | |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0 | |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 | |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' | |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\parcel_images.exe | Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\kWLVXBfTFQKW' /XML 'C:\Users\user\AppData\Local\Temp\tmp2412.tmp' | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe {path} | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpB461.tmp' | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpB81B.tmp' | Jump to behavior |
Source: | Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: RegSvcs.exe, 00000004.00000002.603472332.00000000048E8000.00000004.00000001.sdmp |
Source: | Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.pdb source: RegSvcs.exe, 00000004.00000002.599613900.0000000003565000.00000004.00000040.sdmp |
Source: | Binary string: System.EnterpriseServices.Wrapper.pdb source: dhcpmon.exe, 0000000B.00000002.258862329.0000000005360000.00000002.00000001.sdmp |
Source: | Binary string: indows\mscorlib.pdbpdblib.pdb source: RegSvcs.exe, 00000004.00000002.599613900.0000000003565000.00000004.00000040.sdmp |
Source: | Binary string: indows\RegSvcs.pdbpdbvcs.pdb source: RegSvcs.exe, 00000004.00000002.599613900.0000000003565000.00000004.00000040.sdmp |
Source: | Binary string: C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000004.00000002.599613900.0000000003565000.00000004.00000040.sdmp |
Source: | Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe.4.dr |
Source: | Binary string: mscorrc.pdb source: parcel_images.exe, 00000000.00000002.253906839.0000000006AC0000.00000002.00000001.sdmp, RegSvcs.exe, 00000004.00000002.604432852.0000000006120000.00000002.00000001.sdmp, RegSvcs.exe, 00000009.00000002.255719251.0000000005290000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.259020078.0000000005400000.00000002.00000001.sdmp |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_003D4419 push es; retf | 0_2_003D441C |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_0100054B pushfd ; retf | 0_2_0100054D |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01007581 push esp; retf | 0_2_01007582 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01007589 push esp; retf | 0_2_0100758A |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_010075B8 push ebp; retf | 0_2_010075BA |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_010075C1 push ebp; retf | 0_2_010075C2 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01008C49 push BAFFFFFEh; retn 0001h | 0_2_01008C4E |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_01008CAE push eax; iretd | 0_2_01008CB1 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_010037F0 pushad ; retf | 0_2_010037F1 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_0681AE4B push es; iretd | 0_2_0681AE4C |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06814060 push es; retf | 0_2_06814070 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06F8355F push ebx; retf | 0_2_06F83560 |
Source: C:\Users\user\Desktop\parcel_images.exe | Code function: 0_2_06F83D52 pushad ; ret | 0_2_06F83D53 |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_019174B8 push ebp; ret | 4_2_019174B9 |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_019174AC push ecx; ret | 4_2_019174AD |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Code function: 4_2_01919D78 pushad ; retf | 4_2_01919D79 |
Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.cs | High entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs=' |
Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.cs | High entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK' |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\parcel_images.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |