Loading ...

Play interactive tourEdit tour

Analysis Report YoWPu2BQzA9FeDd.exe

Overview

General Information

Sample Name:YoWPu2BQzA9FeDd.exe
Analysis ID:357125
MD5:d89532eebd77f5bcf86552e5178eb695
SHA1:2905b1b7c9757266077d4c79a81cf410188aa9ee
SHA256:619c9abd4165537a7e53c57f2c0a2ab9597c35f53a4bb0b9cdff82814ddd73cd
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • YoWPu2BQzA9FeDd.exe (PID: 4828 cmdline: 'C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exe' MD5: D89532EEBD77F5BCF86552E5178EB695)
    • schtasks.exe (PID: 780 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\jVzJHCyF' /XML 'C:\Users\user\AppData\Local\Temp\tmpA75F.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 3728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 4544 cmdline: {path} MD5: 71369277D09DA0830C8C59F9E22BB23A)
      • schtasks.exe (PID: 372 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp525A.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6172 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6284 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5614.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6316 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • RegSvcs.exe (PID: 6508 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0 MD5: 71369277D09DA0830C8C59F9E22BB23A)
    • conhost.exe (PID: 6520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6532 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 71369277D09DA0830C8C59F9E22BB23A)
    • conhost.exe (PID: 6548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6684 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 71369277D09DA0830C8C59F9E22BB23A)
    • conhost.exe (PID: 6692 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "572eb7a9-aedf-4b39-8669-f7563dab8a38", "Group": "GREAT", "Domain1": "strongodss.ddns.net", "Domain2": "79.134.225.43", "Port": 58103, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Enable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8009, "BufferSize": "02000100", "MaxPacketSize": "", "GCThreshold": "", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000002.506475973.00000000056F0000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xe75:$x1: NanoCore.ClientPluginHost
  • 0xe8f:$x2: IClientNetworkHost
00000008.00000002.506475973.00000000056F0000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xe75:$x2: NanoCore.ClientPluginHost
  • 0x1261:$s3: PipeExists
  • 0x1136:$s4: PipeCreated
  • 0xeb0:$s5: IClientLoggingHost
00000000.00000002.283047547.0000000003821000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x21957d:$x1: NanoCore.ClientPluginHost
  • 0x24db8d:$x1: NanoCore.ClientPluginHost
  • 0x2195ba:$x2: IClientNetworkHost
  • 0x24dbca:$x2: IClientNetworkHost
  • 0x21d0ed:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0x2516fd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000000.00000002.283047547.0000000003821000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.283047547.0000000003821000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x2192e5:$a: NanoCore
    • 0x2192f5:$a: NanoCore
    • 0x219529:$a: NanoCore
    • 0x21953d:$a: NanoCore
    • 0x21957d:$a: NanoCore
    • 0x24d8f5:$a: NanoCore
    • 0x24d905:$a: NanoCore
    • 0x24db39:$a: NanoCore
    • 0x24db4d:$a: NanoCore
    • 0x24db8d:$a: NanoCore
    • 0x219344:$b: ClientPlugin
    • 0x219546:$b: ClientPlugin
    • 0x219586:$b: ClientPlugin
    • 0x24d954:$b: ClientPlugin
    • 0x24db56:$b: ClientPlugin
    • 0x24db96:$b: ClientPlugin
    • 0x160265:$c: ProjectData
    • 0x21946b:$c: ProjectData
    • 0x24da7b:$c: ProjectData
    • 0x219e72:$d: DESCrypto
    • 0x24e482:$d: DESCrypto
    Click to see the 14 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    0.2.YoWPu2BQzA9FeDd.exe.3934140.1.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x10643d:$x1: NanoCore.ClientPluginHost
    • 0x13aa4d:$x1: NanoCore.ClientPluginHost
    • 0x10647a:$x2: IClientNetworkHost
    • 0x13aa8a:$x2: IClientNetworkHost
    • 0x109fad:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x13e5bd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0.2.YoWPu2BQzA9FeDd.exe.3934140.1.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0.2.YoWPu2BQzA9FeDd.exe.3934140.1.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x1061a5:$a: NanoCore
      • 0x1061b5:$a: NanoCore
      • 0x1063e9:$a: NanoCore
      • 0x1063fd:$a: NanoCore
      • 0x10643d:$a: NanoCore
      • 0x13a7b5:$a: NanoCore
      • 0x13a7c5:$a: NanoCore
      • 0x13a9f9:$a: NanoCore
      • 0x13aa0d:$a: NanoCore
      • 0x13aa4d:$a: NanoCore
      • 0x106204:$b: ClientPlugin
      • 0x106406:$b: ClientPlugin
      • 0x106446:$b: ClientPlugin
      • 0x13a814:$b: ClientPlugin
      • 0x13aa16:$b: ClientPlugin
      • 0x13aa56:$b: ClientPlugin
      • 0x4d125:$c: ProjectData
      • 0x10632b:$c: ProjectData
      • 0x13a93b:$c: ProjectData
      • 0x106d32:$d: DESCrypto
      • 0x13b342:$d: DESCrypto
      0.2.YoWPu2BQzA9FeDd.exe.398cb50.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xada2d:$x1: NanoCore.ClientPluginHost
      • 0xe203d:$x1: NanoCore.ClientPluginHost
      • 0xada6a:$x2: IClientNetworkHost
      • 0xe207a:$x2: IClientNetworkHost
      • 0xb159d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      • 0xe5bad:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0.2.YoWPu2BQzA9FeDd.exe.398cb50.2.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 48 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 4544, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\jVzJHCyF' /XML 'C:\Users\user\AppData\Local\Temp\tmpA75F.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\jVzJHCyF' /XML 'C:\Users\user\AppData\Local\Temp\tmpA75F.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exe' , ParentImage: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exe, ParentProcessId: 4828, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\jVzJHCyF' /XML 'C:\Users\user\AppData\Local\Temp\tmpA75F.tmp', ProcessId: 780

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000008.00000002.505452740.0000000003DF7000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "572eb7a9-aedf-4b39-8669-f7563dab8a38", "Group": "GREAT", "Domain1": "strongodss.ddns.net", "Domain2": "79.134.225.43", "Port": 58103, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Enable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8009, "BufferSize": "02000100", "MaxPacketSize": "", "GCThreshold": "", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Multi AV Scanner detection for domain / URLShow sources
        Source: strongodss.ddns.netVirustotal: Detection: 8%Perma Link
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.283047547.0000000003821000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.505452740.0000000003DF7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.494649173.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.506614119.0000000005990000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4544, type: MEMORY
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.3934140.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.398cb50.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.5990000.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3e03adb.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3e09511.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3e09511.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.5990000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.5994629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3dfec9e.5.raw.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\jVzJHCyF.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: YoWPu2BQzA9FeDd.exeJoe Sandbox ML: detected
        Source: 8.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 8.2.RegSvcs.exe.5990000.11.unpackAvira: Label: TR/NanoCore.fadte

        Compliance:

        barindex
        Uses 32bit PE filesShow sources
        Source: YoWPu2BQzA9FeDd.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Uses new MSVCR DllsShow sources
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
        Source: YoWPu2BQzA9FeDd.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Binary contains paths to debug symbolsShow sources
        Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.pdb source: RegSvcs.exe, 00000008.00000002.499437549.0000000002935000.00000004.00000040.sdmp
        Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: RegSvcs.exe, 00000008.00000002.504378217.0000000002DB1000.00000004.00000001.sdmp
        Source: Binary string: System.EnterpriseServices.Wrapper.pdb source: RegSvcs.exe, 00000012.00000002.294221067.0000000005370000.00000002.00000001.sdmp, dhcpmon.exe, 00000016.00000002.312664300.0000000004DE0000.00000002.00000001.sdmp
        Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: RegSvcs.exe, 00000008.00000002.499437549.0000000002935000.00000004.00000040.sdmp
        Source: Binary string: indows\RegSvcs.pdbpdbvcs.pdb source: RegSvcs.exe, 00000008.00000002.499437549.0000000002935000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000008.00000002.499437549.0000000002935000.00000004.00000040.sdmp
        Source: Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe.8.dr
        Source: Binary string: mscorrc.pdb source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.288606066.0000000007BB0000.00000002.00000001.sdmp, RegSvcs.exe, 00000008.00000002.506428080.0000000005690000.00000002.00000001.sdmp, RegSvcs.exe, 00000012.00000002.294302688.0000000005410000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.294800366.00000000051B0000.00000002.00000001.sdmp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 4x nop then mov esp, ebp

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: 79.134.225.43
        Source: Malware configuration extractorURLs: strongodss.ddns.net
        Connects to many ports of the same IP (likely port scanning)Show sources
        Source: global trafficTCP traffic: 79.134.225.43 ports 0,1,3,58103,5,8
        Source: global trafficTCP traffic: 87.237.165.78 ports 0,1,3,58103,5,8
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: strongodss.ddns.net
        Source: global trafficTCP traffic: 192.168.2.5:49721 -> 87.237.165.78:58103
        Source: global trafficTCP traffic: 192.168.2.5:49726 -> 79.134.225.43:58103
        Source: Joe Sandbox ViewIP Address: 79.134.225.43 79.134.225.43
        Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
        Source: unknownDNS traffic detected: queries for: strongodss.ddns.net
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmp, YoWPu2BQzA9FeDd.exe, 00000000.00000003.228983734.0000000004C1B000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmp, YoWPu2BQzA9FeDd.exe, 00000000.00000003.233377138.0000000004C09000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.233377138.0000000004C09000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers:
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmp, YoWPu2BQzA9FeDd.exe, 00000000.00000003.233677879.0000000004C0D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.233677879.0000000004C0D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersURWf
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.278818842.0000000004C00000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.come.com
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.278818842.0000000004C00000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.como
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.278818842.0000000004C00000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.como?
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.228746620.0000000004C1B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comX
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.228766582.0000000004C1B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comcr
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.228812281.0000000004C1B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comn
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.230415696.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.230415696.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/gH
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.230415696.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn1
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.230415696.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnj
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.230415696.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnw
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmp, YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/CursF
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Negr4
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Treb
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0ta?
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/a-e
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/c
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ita
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/-
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/u
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmp, YoWPu2BQzA9FeDd.exe, 00000000.00000003.228812281.0000000004C1B000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.228715164.0000000004C1B000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comkjz:
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmp, YoWPu2BQzA9FeDd.exe, 00000000.00000003.229801364.0000000004C06000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.229801364.0000000004C06000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kre
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.229005082.0000000004C1B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com#
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.229033812.0000000004C1B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com(
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.229033812.0000000004C1B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comcom#
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000003.229033812.0000000004C1B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comh
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.279434779.00000000008D9000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: RegSvcs.exe, 00000008.00000002.505452740.0000000003DF7000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.283047547.0000000003821000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.505452740.0000000003DF7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.494649173.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.506614119.0000000005990000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4544, type: MEMORY
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.3934140.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.398cb50.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.5990000.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3e03adb.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3e09511.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3e09511.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.5990000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.5994629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3dfec9e.5.raw.unpack, type: UNPACKEDPE

        Operating System Destruction:

        barindex
        Protects its processes via BreakOnTermination flagShow sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: 01 00 00 00

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000008.00000002.506475973.00000000056F0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.283047547.0000000003821000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.283047547.0000000003821000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.505452740.0000000003DF7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.494649173.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000002.494649173.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.506530348.0000000005840000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000002.506614119.0000000005990000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegSvcs.exe PID: 4544, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegSvcs.exe PID: 4544, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.YoWPu2BQzA9FeDd.exe.3934140.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.YoWPu2BQzA9FeDd.exe.3934140.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.YoWPu2BQzA9FeDd.exe.398cb50.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.YoWPu2BQzA9FeDd.exe.398cb50.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.RegSvcs.exe.2dc14b4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.2dc14b4.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.3dfec9e.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.5990000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.56f0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.3e03adb.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.3e03adb.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.RegSvcs.exe.3e09511.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.2dc6330.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.RegSvcs.exe.3e09511.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.5990000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.5840000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.5994629.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.3dfec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.3dfec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_04EF1572 NtSetInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_04EF1836 NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_04EF17FB NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_04EF1541 NtSetInformationProcess,
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_008C51C8
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_008C01F0
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_008C4341
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_008C7C0F
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_008C51B9
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_008C01E2
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_008C6149
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_008C5EB1
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_008C5F0A
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_008C5F10
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_06287D09
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00DB7AC1
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_02948E68
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_02949A68
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_029423A0
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_02942FA8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_0294B738
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_02949B2F
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_0294306F
        Source: YoWPu2BQzA9FeDd.exeBinary or memory string: OriginalFilename vs YoWPu2BQzA9FeDd.exe
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.288850141.0000000008200000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs YoWPu2BQzA9FeDd.exe
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.284140191.0000000004A50000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs YoWPu2BQzA9FeDd.exe
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280366321.000000000286A000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAssemblyReferenceEntry.exeD vs YoWPu2BQzA9FeDd.exe
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.279434779.00000000008D9000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs YoWPu2BQzA9FeDd.exe
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.289207724.00000000082F0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs YoWPu2BQzA9FeDd.exe
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.289207724.00000000082F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs YoWPu2BQzA9FeDd.exe
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.288606066.0000000007BB0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs YoWPu2BQzA9FeDd.exe
        Source: YoWPu2BQzA9FeDd.exeBinary or memory string: OriginalFilename vs YoWPu2BQzA9FeDd.exe
        Source: YoWPu2BQzA9FeDd.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000008.00000002.506475973.00000000056F0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.506475973.00000000056F0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000000.00000002.283047547.0000000003821000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.283047547.0000000003821000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.505452740.0000000003DF7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.494649173.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.494649173.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.506530348.0000000005840000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.506530348.0000000005840000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000008.00000002.506614119.0000000005990000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.506614119.0000000005990000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: Process Memory Space: RegSvcs.exe PID: 4544, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: RegSvcs.exe PID: 4544, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.YoWPu2BQzA9FeDd.exe.3934140.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.YoWPu2BQzA9FeDd.exe.3934140.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.YoWPu2BQzA9FeDd.exe.398cb50.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.YoWPu2BQzA9FeDd.exe.398cb50.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.RegSvcs.exe.2dc14b4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.2dc14b4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.RegSvcs.exe.2dc14b4.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.2dc14b4.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.RegSvcs.exe.3dfec9e.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.3dfec9e.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.RegSvcs.exe.5990000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.5990000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.RegSvcs.exe.56f0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.56f0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.RegSvcs.exe.3e03adb.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.3e03adb.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.RegSvcs.exe.3e03adb.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.RegSvcs.exe.3e09511.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.3e09511.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.RegSvcs.exe.2dc6330.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.2dc6330.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.RegSvcs.exe.3e09511.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.3e09511.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.RegSvcs.exe.5990000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.5990000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.RegSvcs.exe.5840000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.5840000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.RegSvcs.exe.5994629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.5994629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.RegSvcs.exe.3dfec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.3dfec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.RegSvcs.exe.3dfec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: YoWPu2BQzA9FeDd.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: jVzJHCyF.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 8.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 8.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 8.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@18/13@11/2
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_04EF13F6 AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_04EF13BF AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeFile created: C:\Users\user\AppData\Roaming\jVzJHCyF.exeJump to behavior
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeMutant created: \Sessions\1\BaseNamedObjects\jgGlHw
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6316:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3728:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6548:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6172:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6520:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6692:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{572eb7a9-aedf-4b39-8669-f7563dab8a38}
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeFile created: C:\Users\user\AppData\Local\Temp\tmpA75F.tmpJump to behavior
        Source: YoWPu2BQzA9FeDd.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeFile read: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exe 'C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\jVzJHCyF' /XML 'C:\Users\user\AppData\Local\Temp\tmpA75F.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe {path}
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp525A.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5614.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\jVzJHCyF' /XML 'C:\Users\user\AppData\Local\Temp\tmpA75F.tmp'
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe {path}
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp525A.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5614.tmp'
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: YoWPu2BQzA9FeDd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: YoWPu2BQzA9FeDd.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.pdb source: RegSvcs.exe, 00000008.00000002.499437549.0000000002935000.00000004.00000040.sdmp
        Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: RegSvcs.exe, 00000008.00000002.504378217.0000000002DB1000.00000004.00000001.sdmp
        Source: Binary string: System.EnterpriseServices.Wrapper.pdb source: RegSvcs.exe, 00000012.00000002.294221067.0000000005370000.00000002.00000001.sdmp, dhcpmon.exe, 00000016.00000002.312664300.0000000004DE0000.00000002.00000001.sdmp
        Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: RegSvcs.exe, 00000008.00000002.499437549.0000000002935000.00000004.00000040.sdmp
        Source: Binary string: indows\RegSvcs.pdbpdbvcs.pdb source: RegSvcs.exe, 00000008.00000002.499437549.0000000002935000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000008.00000002.499437549.0000000002935000.00000004.00000040.sdmp
        Source: Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe.8.dr
        Source: Binary string: mscorrc.pdb source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.288606066.0000000007BB0000.00000002.00000001.sdmp, RegSvcs.exe, 00000008.00000002.506428080.0000000005690000.00000002.00000001.sdmp, RegSvcs.exe, 00000012.00000002.294302688.0000000005410000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.294800366.00000000051B0000.00000002.00000001.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 8.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 8.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_00692DE9 push es; ret
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_006930BD pushfd ; ret
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_006A78E3 push ebp; ret
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_006A78DC push ecx; ret
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_008C983B push ds; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00DBE085 push eax; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00DB9D74 push 7800DBCBh; retf
        Source: initial sampleStatic PE information: section name: .text entropy: 7.92573751907
        Source: initial sampleStatic PE information: section name: .text entropy: 7.92573751907
        Source: 8.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 8.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeFile created: C:\Users\user\AppData\Roaming\jVzJHCyF.exeJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\jVzJHCyF' /XML 'C:\Users\user\AppData\Local\Temp\tmpA75F.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM_3Show sources
        Source: Yara matchFile source: Process Memory Space: YoWPu2BQzA9FeDd.exe PID: 4828, type: MEMORY
        Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)Show sources
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280316491.0000000002842000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME<
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280316491.0000000002842000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280348585.0000000002858000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum name: 0
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: foregroundWindowGot 777
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exe TID: 5512Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6648Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6736Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_04EF161A GetSystemInfo,
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280316491.0000000002842000.00000004.00000001.sdmpBinary or memory string: r&%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\<
        Source: RegSvcs.exe, 00000008.00000002.496756865.0000000000C17000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllV
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280348585.0000000002858000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II<
        Source: RegSvcs.exe, 00000008.00000002.507169436.0000000006250000.00000002.00000001.sdmp, RegSvcs.exe, 00000012.00000002.294348618.0000000005470000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.294856223.0000000005210000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280316491.0000000002842000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280316491.0000000002842000.00000004.00000001.sdmpBinary or memory string: r#"SOFTWARE\VMware, Inc.\VMware ToolsH
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280316491.0000000002842000.00000004.00000001.sdmpBinary or memory string: r87HKEY_LOCAL_MACHINE\SOFTWARE\VMware, Inc.\VMware Tools\.
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280316491.0000000002842000.00000004.00000001.sdmpBinary or memory string: r"SOFTWARE\VMware, Inc.\VMware Tools
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280316491.0000000002842000.00000004.00000001.sdmpBinary or memory string: VMWARE<
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280316491.0000000002842000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280316491.0000000002842000.00000004.00000001.sdmpBinary or memory string: QEMU<
        Source: RegSvcs.exe, 00000008.00000002.507169436.0000000006250000.00000002.00000001.sdmp, RegSvcs.exe, 00000012.00000002.294348618.0000000005470000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.294856223.0000000005210000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280316491.0000000002842000.00000004.00000001.sdmpBinary or memory string: r%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: RegSvcs.exe, 00000008.00000002.507169436.0000000006250000.00000002.00000001.sdmp, RegSvcs.exe, 00000012.00000002.294348618.0000000005470000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.294856223.0000000005210000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280316491.0000000002842000.00000004.00000001.sdmpBinary or memory string: rA"SOFTWARE\VMware, Inc.\VMware Tools
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280348585.0000000002858000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: YoWPu2BQzA9FeDd.exe, 00000000.00000002.280316491.0000000002842000.00000004.00000001.sdmpBinary or memory string: r#"SOFTWARE\VMware, Inc.\VMware Tools<
        Source: RegSvcs.exe, 00000008.00000002.507169436.0000000006250000.00000002.00000001.sdmp, RegSvcs.exe, 00000012.00000002.294348618.0000000005470000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.294856223.0000000005210000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Allocates memory in foreign processesShow sources
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 protect: page execute and read and write
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 402000
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 420000
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 422000
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 7AC008
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\jVzJHCyF' /XML 'C:\Users\user\AppData\Local\Temp\tmpA75F.tmp'
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe {path}
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp525A.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5614.tmp'
        Source: RegSvcs.exe, 00000008.00000002.504694681.0000000002E80000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: RegSvcs.exe, 00000008.00000002.498902939.0000000001440000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: RegSvcs.exe, 00000008.00000002.498902939.0000000001440000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: RegSvcs.exe, 00000008.00000002.498902939.0000000001440000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
        Source: RegSvcs.exe, 00000008.00000002.496592554.0000000000BE9000.00000004.00000020.sdmpBinary or memory string: Program Manageruld be made because the target machine actively refused it.
        Source: RegSvcs.exe, 00000008.00000002.498902939.0000000001440000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
        Source: RegSvcs.exe, 00000008.00000002.498902939.0000000001440000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: RegSvcs.exe, 00000008.00000002.496592554.0000000000BE9000.00000004.00000020.sdmpBinary or memory string: Program Manager (x86)\DHCP Monitor\dhcpmon.exegSvcs.exeH
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exeCode function: 0_2_04A219F6 GetUserNameA,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.283047547.0000000003821000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.505452740.0000000003DF7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.494649173.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.506614119.0000000005990000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4544, type: MEMORY
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.3934140.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.398cb50.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.5990000.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3e03adb.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3e09511.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3e09511.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.5990000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.5994629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3dfec9e.5.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: RegSvcs.exe, 00000008.00000002.506475973.00000000056F0000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000008.00000002.506475973.00000000056F0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: RegSvcs.exe, 00000008.00000002.504378217.0000000002DB1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.283047547.0000000003821000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.505452740.0000000003DF7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.494649173.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.506614119.0000000005990000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4544, type: MEMORY
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.3934140.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.398cb50.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.5990000.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3e03adb.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3e09511.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YoWPu2BQzA9FeDd.exe.3a2a3f0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3e09511.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.5990000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.5994629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3dfec9e.5.raw.unpack, type: UNPACKEDPE
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_04EF2B26 bind,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_04EF2AF6 bind,

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Access Token Manipulation1Disable or Modify Tools1Input Capture21Account Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsProcess Injection312Deobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture21Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Obfuscated Files or Information3Security Account ManagerSystem Information Discovery13SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing13NTDSSecurity Software Discovery211Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading2LSA SecretsVirtualization/Sandbox Evasion13SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion13Cached Domain CredentialsProcess Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection312Proc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 357125 Sample: YoWPu2BQzA9FeDd.exe Startdate: 24/02/2021 Architecture: WINDOWS Score: 100 52 strongodss.ddns.net 2->52 58 Multi AV Scanner detection for domain / URL 2->58 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 64 13 other signatures 2->64 9 YoWPu2BQzA9FeDd.exe 6 2->9         started        13 RegSvcs.exe 4 2->13         started        15 dhcpmon.exe 4 2->15         started        17 dhcpmon.exe 3 2->17         started        signatures3 process4 file5 46 C:\Users\user\AppData\Roaming\jVzJHCyF.exe, PE32 9->46 dropped 48 C:\Users\user\AppData\Local\...\tmpA75F.tmp, XML 9->48 dropped 50 C:\Users\user\...\YoWPu2BQzA9FeDd.exe.log, ASCII 9->50 dropped 70 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 9->70 72 Writes to foreign memory regions 9->72 74 Allocates memory in foreign processes 9->74 76 Injects a PE file into a foreign processes 9->76 19 RegSvcs.exe 1 13 9->19         started        24 schtasks.exe 1 9->24         started        26 conhost.exe 13->26         started        28 conhost.exe 15->28         started        30 conhost.exe 17->30         started        signatures6 process7 dnsIp8 54 strongodss.ddns.net 87.237.165.78, 49721, 49724, 49725 MTVHGB Russian Federation 19->54 56 79.134.225.43, 49726, 49729, 49733 FINK-TELECOM-SERVICESCH Switzerland 19->56 42 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 19->42 dropped 44 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->44 dropped 66 Protects its processes via BreakOnTermination flag 19->66 68 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->68 32 schtasks.exe 1 19->32         started        34 schtasks.exe 1 19->34         started        36 conhost.exe 24->36         started        file9 signatures10 process11 process12 38 conhost.exe 32->38         started        40 conhost.exe 34->40         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        YoWPu2BQzA9FeDd.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\jVzJHCyF.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        8.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        8.2.RegSvcs.exe.5990000.11.unpack100%AviraTR/NanoCore.fadteDownload File

        Domains

        SourceDetectionScannerLabelLink
        strongodss.ddns.net8%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://www.jiyu-kobo.co.jp/CursF0%Avira URL Cloudsafe
        79.134.225.431%VirustotalBrowse
        79.134.225.430%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/a-e0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Treb0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Negr40%Avira URL Cloudsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.fontbureau.como?0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnj0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnw0%Avira URL Cloudsafe
        http://www.sajatypeworks.comkjz:0%Avira URL Cloudsafe
        http://www.fonts.comn0%URL Reputationsafe
        http://www.fonts.comn0%URL Reputationsafe
        http://www.fonts.comn0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.tiro.com(0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.tiro.com#0%Avira URL Cloudsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Y0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Y0ta?0%Avira URL Cloudsafe
        http://www.sandoll.co.kre0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/gH0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.fontbureau.come.com0%URL Reputationsafe
        http://www.fontbureau.come.com0%URL Reputationsafe
        http://www.fontbureau.come.com0%URL Reputationsafe
        http://www.fonts.comX0%Avira URL Cloudsafe
        strongodss.ddns.net0%Avira URL Cloudsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn10%Avira URL Cloudsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/u0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/u0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/u0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/ita0%Avira URL Cloudsafe
        http://www.fontbureau.como0%URL Reputationsafe
        http://www.fontbureau.como0%URL Reputationsafe
        http://www.fontbureau.como0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/-0%Avira URL Cloudsafe
        http://www.fonts.comcr0%Avira URL Cloudsafe
        http://www.tiro.comcom#0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/c0%Avira URL Cloudsafe
        http://www.tiro.comh0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        strongodss.ddns.net
        87.237.165.78
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        79.134.225.43true
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        strongodss.ddns.nettrue
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.jiyu-kobo.co.jp/CursFYoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designersGYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmp, YoWPu2BQzA9FeDd.exe, 00000000.00000003.233677879.0000000004C0D000.00000004.00000001.sdmpfalse
          high
          http://www.fontbureau.com/designers/?YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
            high
            http://www.founder.com.cn/cn/bTheYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/a-eYoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designers?YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
              high
              http://www.jiyu-kobo.co.jp/TrebYoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.tiro.comYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designersYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmp, YoWPu2BQzA9FeDd.exe, 00000000.00000003.233377138.0000000004C09000.00000004.00000001.sdmpfalse
                high
                http://www.goodfont.co.krYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/Negr4YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.sajatypeworks.comYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmp, YoWPu2BQzA9FeDd.exe, 00000000.00000003.228812281.0000000004C1B000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.typography.netDYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn/cTheYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.galapagosdesign.com/staff/dennis.htmYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://fontfabrik.comYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmp, YoWPu2BQzA9FeDd.exe, 00000000.00000003.228983734.0000000004C1B000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fontbureau.como?YoWPu2BQzA9FeDd.exe, 00000000.00000003.278818842.0000000004C00000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.founder.com.cn/cnjYoWPu2BQzA9FeDd.exe, 00000000.00000003.230415696.0000000004C04000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.founder.com.cn/cnwYoWPu2BQzA9FeDd.exe, 00000000.00000003.230415696.0000000004C04000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.sajatypeworks.comkjz:YoWPu2BQzA9FeDd.exe, 00000000.00000003.228715164.0000000004C1B000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fonts.comnYoWPu2BQzA9FeDd.exe, 00000000.00000003.228812281.0000000004C1B000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.galapagosdesign.com/DPleaseYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fonts.comYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                  high
                  http://www.sandoll.co.krYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmp, YoWPu2BQzA9FeDd.exe, 00000000.00000003.229801364.0000000004C06000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.urwpp.deDPleaseYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.tiro.com(YoWPu2BQzA9FeDd.exe, 00000000.00000003.229033812.0000000004C1B000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.zhongyicts.com.cnYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.tiro.com#YoWPu2BQzA9FeDd.exe, 00000000.00000003.229005082.0000000004C1B000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.sakkal.comYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/YYoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.apache.org/licenses/LICENSE-2.0YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                    high
                    http://www.fontbureau.comYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/Y0ta?YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.sandoll.co.kreYoWPu2BQzA9FeDd.exe, 00000000.00000003.229801364.0000000004C06000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.founder.com.cn/cn/gHYoWPu2BQzA9FeDd.exe, 00000000.00000003.230415696.0000000004C04000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.come.comYoWPu2BQzA9FeDd.exe, 00000000.00000003.278818842.0000000004C00000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.comXYoWPu2BQzA9FeDd.exe, 00000000.00000003.228746620.0000000004C1B000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.carterandcone.comlYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/YoWPu2BQzA9FeDd.exe, 00000000.00000003.230415696.0000000004C04000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                        high
                        http://www.founder.com.cn/cn1YoWPu2BQzA9FeDd.exe, 00000000.00000003.230415696.0000000004C04000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.founder.com.cn/cnYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-jones.htmlYoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/uYoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmp, YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/itaYoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.comoYoWPu2BQzA9FeDd.exe, 00000000.00000003.278818842.0000000004C00000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/jp/-YoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.com/designers8YoWPu2BQzA9FeDd.exe, 00000000.00000002.284590175.0000000004D70000.00000002.00000001.sdmpfalse
                            high
                            http://www.fonts.comcrYoWPu2BQzA9FeDd.exe, 00000000.00000003.228766582.0000000004C1B000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.tiro.comcom#YoWPu2BQzA9FeDd.exe, 00000000.00000003.229033812.0000000004C1B000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/cYoWPu2BQzA9FeDd.exe, 00000000.00000003.231570437.0000000004C04000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designers:YoWPu2BQzA9FeDd.exe, 00000000.00000003.233377138.0000000004C09000.00000004.00000001.sdmpfalse
                              high
                              http://www.tiro.comhYoWPu2BQzA9FeDd.exe, 00000000.00000003.229033812.0000000004C1B000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.com/designersURWfYoWPu2BQzA9FeDd.exe, 00000000.00000003.233677879.0000000004C0D000.00000004.00000001.sdmpfalse
                                high

                                Contacted IPs

                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs

                                Public

                                IPDomainCountryFlagASNASN NameMalicious
                                87.237.165.78
                                unknownRussian Federation
                                49967MTVHGBtrue
                                79.134.225.43
                                unknownSwitzerland
                                6775FINK-TELECOM-SERVICESCHtrue

                                General Information

                                Joe Sandbox Version:31.0.0 Emerald
                                Analysis ID:357125
                                Start date:24.02.2021
                                Start time:08:21:11
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 10m 19s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:YoWPu2BQzA9FeDd.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:35
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@18/13@11/2
                                EGA Information:Failed
                                HDC Information:
                                • Successful, ratio: 16.5% (good quality ratio 11.6%)
                                • Quality average: 43.6%
                                • Quality standard deviation: 35.8%
                                HCA Information:
                                • Successful, ratio: 94%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .exe
                                Warnings:
                                Show All
                                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                • TCP Packets have been reduced to 100
                                • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, HxTsr.exe, RuntimeBroker.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 52.255.188.83, 51.103.5.159, 131.253.33.200, 13.107.22.200, 204.79.197.200, 13.107.21.200, 51.11.168.160, 93.184.220.29, 104.43.193.48, 40.88.32.150, 92.122.145.220, 184.30.20.56, 51.104.144.132, 93.184.221.240, 51.104.139.180, 92.122.213.247, 92.122.213.194, 20.54.26.129
                                • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, cs9.wac.phicdn.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, vip1-par02p.wns.notify.trafficmanager.net, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, wu.wpc.apr-52dd2.edgecastdns.net, au-bg-shim.trafficmanager.net, www.bing.com, client.wns.windows.com, fs.microsoft.com, dual-a-0001.a-msedge.net, wu.ec.azureedge.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus15.cloudapp.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                08:22:06API Interceptor1x Sleep call for process: YoWPu2BQzA9FeDd.exe modified
                                08:22:28API Interceptor822x Sleep call for process: RegSvcs.exe modified
                                08:22:29Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" s>$(Arg0)
                                08:22:29Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                08:22:30AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe

                                Joe Sandbox View / Context

                                IPs

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                87.237.165.78M5QDAaK9yM.exeGet hashmaliciousBrowse
                                  TdX45jQWjj.exeGet hashmaliciousBrowse
                                    79.134.225.43TdX45jQWjj.exeGet hashmaliciousBrowse
                                      JfRbEbUkpV39K4L.exeGet hashmaliciousBrowse
                                        Dachser Consulta de cliente saliente no. 000150849 - SKBMT03082020-0012-IMG0149.exeGet hashmaliciousBrowse
                                          290453721.xlsGet hashmaliciousBrowse
                                            nUo0FukkVO.xlsGet hashmaliciousBrowse

                                              Domains

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              strongodss.ddns.netM5QDAaK9yM.exeGet hashmaliciousBrowse
                                              • 87.237.165.78
                                              TdX45jQWjj.exeGet hashmaliciousBrowse
                                              • 87.237.165.78

                                              ASN

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              MTVHGBM5QDAaK9yM.exeGet hashmaliciousBrowse
                                              • 87.237.165.78
                                              TdX45jQWjj.exeGet hashmaliciousBrowse
                                              • 87.237.165.78
                                              QUOTATION 19 01 2021.exeGet hashmaliciousBrowse
                                              • 87.237.165.162
                                              FINK-TELECOM-SERVICESCHxF7GogN7tM.exeGet hashmaliciousBrowse
                                              • 79.134.225.120
                                              TZgGVyMJYF.exeGet hashmaliciousBrowse
                                              • 79.134.225.74
                                              ilpbALnKbE.exeGet hashmaliciousBrowse
                                              • 79.134.225.103
                                              Documents.exeGet hashmaliciousBrowse
                                              • 79.134.225.87
                                              SWcNyi2YBj.exeGet hashmaliciousBrowse
                                              • 79.134.225.103
                                              Confirmation Transfer Note Ref Number0002636.exeGet hashmaliciousBrowse
                                              • 79.134.225.8
                                              TdX45jQWjj.exeGet hashmaliciousBrowse
                                              • 79.134.225.43
                                              e92b274943f4a3a557881ee0dd57772d.exeGet hashmaliciousBrowse
                                              • 79.134.225.105
                                              WxTm2cWLHF.exeGet hashmaliciousBrowse
                                              • 79.134.225.71
                                              Payment Confirmation.exeGet hashmaliciousBrowse
                                              • 79.134.225.30
                                              rjHlt1zz28.exeGet hashmaliciousBrowse
                                              • 79.134.225.49
                                              Deadly Variants of Covid 19.docGet hashmaliciousBrowse
                                              • 79.134.225.49
                                              document.exeGet hashmaliciousBrowse
                                              • 79.134.225.122
                                              5293ea9467ea45e928620a5ed74440f5.exeGet hashmaliciousBrowse
                                              • 79.134.225.105
                                              f1a14e6352036833f1c109e1bb2934f2.exeGet hashmaliciousBrowse
                                              • 79.134.225.105
                                              256ec8f8f67b59c5e085b0bb63afcd13.exeGet hashmaliciousBrowse
                                              • 79.134.225.105
                                              JOIN.exeGet hashmaliciousBrowse
                                              • 79.134.225.30
                                              Delivery pdf.exeGet hashmaliciousBrowse
                                              • 79.134.225.25
                                              d88e07467ddcf9e3b19fa972b9f000d1.exeGet hashmaliciousBrowse
                                              • 79.134.225.105
                                              fnfqzfwC44.exeGet hashmaliciousBrowse
                                              • 79.134.225.25

                                              JA3 Fingerprints

                                              No context

                                              Dropped Files

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeM5QDAaK9yM.exeGet hashmaliciousBrowse
                                                oMWv1Zof2y.exeGet hashmaliciousBrowse
                                                  TdX45jQWjj.exeGet hashmaliciousBrowse
                                                    QTxFuxF5NQ.exeGet hashmaliciousBrowse
                                                      a34b93ef-dea2-45f8-a5bf-4f6b0b5291c7.exeGet hashmaliciousBrowse
                                                        3fcd8c19-af88-4cd9-87e7-0bfea1de01a1.exeGet hashmaliciousBrowse
                                                          Vietnam Order.exeGet hashmaliciousBrowse
                                                            Dhl Shipping Document.exeGet hashmaliciousBrowse
                                                              PO-WJO-001, pdf.exeGet hashmaliciousBrowse
                                                                byWuWAR5FD.exeGet hashmaliciousBrowse
                                                                  parcel_images.exeGet hashmaliciousBrowse
                                                                    0712020.exeGet hashmaliciousBrowse
                                                                      JfRbEbUkpV39K4L.exeGet hashmaliciousBrowse
                                                                        DECEMBER QUOTATION REQUEST FOR FR12007POH0008_PO0000143_ETQ.exeGet hashmaliciousBrowse
                                                                          DECEMBER QUOTATION REQUEST FOR FR12007POH0008_PO0000143_ETQ.exeGet hashmaliciousBrowse
                                                                            zC3edqmNNt.exeGet hashmaliciousBrowse
                                                                              Shipping Document.pdf..exeGet hashmaliciousBrowse
                                                                                PPR & CPR_HEA_DECEMBER 4 2020.exeGet hashmaliciousBrowse
                                                                                  AdministratorDownloadsBL,.rar.exeGet hashmaliciousBrowse
                                                                                    signed_19272.zip(#U007e18 KB) (2).exeGet hashmaliciousBrowse

                                                                                      Created / dropped Files

                                                                                      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                      File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):32768
                                                                                      Entropy (8bit):3.7515815714465193
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:BOj9Y8/gS7SDriLGKq1MHR5U4Ag6ihJSxUCR1rgCPKabK2t0X5P7DZ+JgWSW72uw:B+gSAdN1MH3HAFRJngW2u
                                                                                      MD5:71369277D09DA0830C8C59F9E22BB23A
                                                                                      SHA1:37F9781314F0F6B7E9CB529A573F2B1C8DE9E93F
                                                                                      SHA-256:D4527B7AD2FC4778CC5BE8709C95AEA44EAC0568B367EE14F7357D72898C3698
                                                                                      SHA-512:2F470383E3C796C4CF212EC280854DBB9E7E8C8010CE6857E58F8E7066D7516B7CD7039BC5C0F547E1F5C7F9F2287869ADFFB2869800B08B2982A88BE96E9FB7
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Joe Sandbox View:
                                                                                      • Filename: M5QDAaK9yM.exe, Detection: malicious, Browse
                                                                                      • Filename: oMWv1Zof2y.exe, Detection: malicious, Browse
                                                                                      • Filename: TdX45jQWjj.exe, Detection: malicious, Browse
                                                                                      • Filename: QTxFuxF5NQ.exe, Detection: malicious, Browse
                                                                                      • Filename: a34b93ef-dea2-45f8-a5bf-4f6b0b5291c7.exe, Detection: malicious, Browse
                                                                                      • Filename: 3fcd8c19-af88-4cd9-87e7-0bfea1de01a1.exe, Detection: malicious, Browse
                                                                                      • Filename: Vietnam Order.exe, Detection: malicious, Browse
                                                                                      • Filename: Dhl Shipping Document.exe, Detection: malicious, Browse
                                                                                      • Filename: PO-WJO-001, pdf.exe, Detection: malicious, Browse
                                                                                      • Filename: byWuWAR5FD.exe, Detection: malicious, Browse
                                                                                      • Filename: parcel_images.exe, Detection: malicious, Browse
                                                                                      • Filename: 0712020.exe, Detection: malicious, Browse
                                                                                      • Filename: JfRbEbUkpV39K4L.exe, Detection: malicious, Browse
                                                                                      • Filename: DECEMBER QUOTATION REQUEST FOR FR12007POH0008_PO0000143_ETQ.exe, Detection: malicious, Browse
                                                                                      • Filename: DECEMBER QUOTATION REQUEST FOR FR12007POH0008_PO0000143_ETQ.exe, Detection: malicious, Browse
                                                                                      • Filename: zC3edqmNNt.exe, Detection: malicious, Browse
                                                                                      • Filename: Shipping Document.pdf..exe, Detection: malicious, Browse
                                                                                      • Filename: PPR & CPR_HEA_DECEMBER 4 2020.exe, Detection: malicious, Browse
                                                                                      • Filename: AdministratorDownloadsBL,.rar.exe, Detection: malicious, Browse
                                                                                      • Filename: signed_19272.zip(#U007e18 KB) (2).exe, Detection: malicious, Browse
                                                                                      Reputation:moderate, very likely benign file
                                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{Z.................P... .......k... ........@.. ...............................[....@..................................k..K................................... k............................................... ............... ..H............text....K... ...P.................. ..`.rsrc................`..............@..@.reloc...............p..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\RegSvcs.exe.log
                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:modified
                                                                                      Size (bytes):120
                                                                                      Entropy (8bit):5.016405576253028
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:QHXMKaoWglAFXMWA2yTMGfsbNXLVd49Am12MFuAvOAsDeieVyn:Q3LawlAFXMWTyAGCFLIP12MUAvvrs
                                                                                      MD5:50DEC1858E13F033E6DCA3CBFAD5E8DE
                                                                                      SHA1:79AE1E9131B0FAF215B499D2F7B4C595AA120925
                                                                                      SHA-256:14A557E226E3BA8620BB3A70035E1E316F1E9FB5C9E8F74C07110EE90B8D8AE4
                                                                                      SHA-512:1BD73338DF685A5B57B0546E102ECFDEE65800410D6F77845E50456AC70DE72929088AF19B59647F01CBA7A5ACFB399C52D9EF2402A9451366586862EF88E7BF
                                                                                      Malicious:false
                                                                                      Preview: 1,"fusion","GAC",0..2,"System.EnterpriseServices, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\YoWPu2BQzA9FeDd.exe.log
                                                                                      Process:C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):655
                                                                                      Entropy (8bit):5.273171405160065
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9t0U2WUXBQav:MLF20NaL329hJ5g522rWz2p29XBT
                                                                                      MD5:2703120C370FBB4A8BA08C6D1754039E
                                                                                      SHA1:EC0DB47BF00A4A828F796147619386C0BBEA66A1
                                                                                      SHA-256:F95566974BC44F3A757CAFB1456D185D8F333AC84775089DE18310B90C18B1BC
                                                                                      SHA-512:BC05A2A1BE5B122FC6D3DEA66EF4258522F13351B9754378395AAD019631E312CFD3BC990F3E3D5C7BB0BDBA1EAD54A2B34A96DEE2FCCD703721E98F6192ED48
                                                                                      Malicious:true
                                                                                      Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\4de99804c29261edb63c93616550f034\System.Management.ni.dll",0..
                                                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                                                      Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:modified
                                                                                      Size (bytes):120
                                                                                      Entropy (8bit):5.016405576253028
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:QHXMKaoWglAFXMWA2yTMGfsbNXLVd49Am12MFuAvOAsDeieVyn:Q3LawlAFXMWTyAGCFLIP12MUAvvrs
                                                                                      MD5:50DEC1858E13F033E6DCA3CBFAD5E8DE
                                                                                      SHA1:79AE1E9131B0FAF215B499D2F7B4C595AA120925
                                                                                      SHA-256:14A557E226E3BA8620BB3A70035E1E316F1E9FB5C9E8F74C07110EE90B8D8AE4
                                                                                      SHA-512:1BD73338DF685A5B57B0546E102ECFDEE65800410D6F77845E50456AC70DE72929088AF19B59647F01CBA7A5ACFB399C52D9EF2402A9451366586862EF88E7BF
                                                                                      Malicious:false
                                                                                      Preview: 1,"fusion","GAC",0..2,"System.EnterpriseServices, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                      C:\Users\user\AppData\Local\Temp\tmp525A.tmp
                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1320
                                                                                      Entropy (8bit):5.135021273392143
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mn4xtn:cbk4oL600QydbQxIYODOLedq3Z4j
                                                                                      MD5:40B11EF601FB28F9B2E69D36857BF2EC
                                                                                      SHA1:B6454020AD2CEED193F4792B77001D0BD741B370
                                                                                      SHA-256:C51E12D18CC664425F6711D8AE2507068884C7057092CFA11884100E1E9D49E1
                                                                                      SHA-512:E3C5BCC714CBFCA4B8058DDCDDF231DCEFA69C15881CE3F8123E59ED45CFB5DA052B56E1945DCF8DC7F800D62F9A4EECB82BCA69A66A1530787AEFFEB15E2BD5
                                                                                      Malicious:false
                                                                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                      C:\Users\user\AppData\Local\Temp\tmp5614.tmp
                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1310
                                                                                      Entropy (8bit):5.109425792877704
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                                                      MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                                                      SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                                                      SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                                                      SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                                                      Malicious:false
                                                                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                      C:\Users\user\AppData\Local\Temp\tmpA75F.tmp
                                                                                      Process:C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1645
                                                                                      Entropy (8bit):5.184387907108357
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB1ltn:cbhC7ZlNQF/rydbz9I3YODOLNdq3XP
                                                                                      MD5:00610593D653206BB931FCF95B1203BB
                                                                                      SHA1:1C7C0CCA00A060BDBEC31112A2BEB698B80FE70E
                                                                                      SHA-256:1B3CD0A440D8A8EBBB0BCC7DC5D3ED7A442899384700F925EFD5A9BEB388BBC2
                                                                                      SHA-512:F2195BA16493ED0300E13DF91BC36537DB820F03E6D1B5EA18F8BE24C4713D61FB0BF599A14480BD2D35E9E50DB2A6625DCE0C10024B38EF0B40E6737801A6E5
                                                                                      Malicious:true
                                                                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                                                      C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                      File Type:ISO-8859 text
                                                                                      Category:dropped
                                                                                      Size (bytes):8
                                                                                      Entropy (8bit):2.75
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:B6H9tn:UPn
                                                                                      MD5:D1B6084630019902FEB9DE04281559F5
                                                                                      SHA1:E70B066BA32E2D81E593EB4D5B4C3B9D0B8CBF73
                                                                                      SHA-256:EA08804D6AB9E9F7708C2D0DC62474D681028F726BC403EFAF5BE1EAC40213F4
                                                                                      SHA-512:C5F428D1EBD3BD998647045A8132A9EDF5EFB918D633C461DCF312F96EF453D8C7F58261B8EAED9C76D1B185E44B81BA98ED8A081B4D66845F5F1F153FA1ACFA
                                                                                      Malicious:true
                                                                                      Preview: .O._...H
                                                                                      C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):57
                                                                                      Entropy (8bit):4.795707286467131
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:oMty8WbSX/MNn:oMLWus
                                                                                      MD5:D685103573539B7E9FDBF5F1D7DD96CE
                                                                                      SHA1:4B2FE6B5C0B37954B314FCAEE1F12237A9B02D07
                                                                                      SHA-256:D78BC23B0CA3EDDF52D56AB85CDC30A71B3756569CB32AA2F6C28DBC23C76E8E
                                                                                      SHA-512:17769A5944E8929323A34269ABEEF0861D5C6799B0A27F5545FBFADC80E5AB684A471AD6F6A7FC623002385154EA89DE94013051E09120AB94362E542AB0F1DD
                                                                                      Malicious:false
                                                                                      Preview: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                      C:\Users\user\AppData\Roaming\jVzJHCyF.exe
                                                                                      Process:C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):393216
                                                                                      Entropy (8bit):7.913835302870024
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:vd1ZByWI+5c6hL1DNxNGmSMRTOenrUb89mBKAIB1bG3gmA6caIndoQ2NTWqDivu:zrEe7p1DVnrUIGKAIB1PR9dl2NTjD
                                                                                      MD5:D89532EEBD77F5BCF86552E5178EB695
                                                                                      SHA1:2905B1B7C9757266077D4C79A81CF410188AA9EE
                                                                                      SHA-256:619C9ABD4165537A7E53C57F2C0A2AB9597C35F53A4BB0B9CDFF82814DDD73CD
                                                                                      SHA-512:076391F8D60D3A4901469E0F16B4D3DD988848B587ACB217BBB6C8A83FB4EFA2956219AA3ACDF267E835EC1F6704EFE5AC4E1834E1B8729F9CFD35458D020AF8
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...9.5`................................. ........@.. .......................`............@.....................................K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H....... ...`[...........g..HQ..........................................r.(8......r...p(7.....o;....*....0............{.....+..*.0..*.........#............,...}....+..#........}....*...0............{.....+..*.0..*.........#............,...}....+..#........}....*...0............{.....+..*.0..*.........#............,...}....+..#........}....*...0..M........#.......@.{.....{....ZZ#.......@.{.....{....ZZX#.......@.{.....{....ZZX.+..*....0............{.....{....Z.{....Z.+..*...0..
                                                                                      \Device\ConDrv
                                                                                      Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1145
                                                                                      Entropy (8bit):4.462201512373672
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:zKLXkzPDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0zPDQntKKH1MqJC
                                                                                      MD5:46EBEB88876A00A52CC37B1F8E0D0438
                                                                                      SHA1:5E5DB352F964E5F398301662FF558BD905798A65
                                                                                      SHA-256:D65BD5A6CC112838AFE8FA70BF61FD13C1313BCE3EE3E76C50E454D7B581238B
                                                                                      SHA-512:E713E6F304A469FB71235C598BC7E2C6F8458ABC61DAF3D1F364F66579CAFA4A7F3023E585BDA552FB400009E7805A8CA0311A50D5EDC9C2AD2D067772A071BE
                                                                                      Malicious:false
                                                                                      Preview: Microsoft (R) .NET Framework Services Installation Utility Version 2.0.50727.8922..Copyright (c) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output...

                                                                                      Static File Info

                                                                                      General

                                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Entropy (8bit):7.913835302870024
                                                                                      TrID:
                                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                                                                      • Win32 Executable (generic) a (10002005/4) 49.93%
                                                                                      • Windows Screen Saver (13104/52) 0.07%
                                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                                      File name:YoWPu2BQzA9FeDd.exe
                                                                                      File size:393216
                                                                                      MD5:d89532eebd77f5bcf86552e5178eb695
                                                                                      SHA1:2905b1b7c9757266077d4c79a81cf410188aa9ee
                                                                                      SHA256:619c9abd4165537a7e53c57f2c0a2ab9597c35f53a4bb0b9cdff82814ddd73cd
                                                                                      SHA512:076391f8d60d3a4901469e0f16b4d3dd988848b587acb217bbb6c8a83fb4efa2956219aa3acdf267e835ec1f6704efe5ac4e1834e1b8729f9cfd35458d020af8
                                                                                      SSDEEP:6144:vd1ZByWI+5c6hL1DNxNGmSMRTOenrUb89mBKAIB1bG3gmA6caIndoQ2NTWqDivu:zrEe7p1DVnrUIGKAIB1PR9dl2NTjD
                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...9.5`................................. ........@.. .......................`............@................................

                                                                                      File Icon

                                                                                      Icon Hash:00828e8e8686b000

                                                                                      Static PE Info

                                                                                      General

                                                                                      Entrypoint:0x4614ce
                                                                                      Entrypoint Section:.text
                                                                                      Digitally signed:false
                                                                                      Imagebase:0x400000
                                                                                      Subsystem:windows gui
                                                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                      Time Stamp:0x60359A39 [Wed Feb 24 00:13:45 2021 UTC]
                                                                                      TLS Callbacks:
                                                                                      CLR (.Net) Version:v2.0.50727
                                                                                      OS Version Major:4
                                                                                      OS Version Minor:0
                                                                                      File Version Major:4
                                                                                      File Version Minor:0
                                                                                      Subsystem Version Major:4
                                                                                      Subsystem Version Minor:0
                                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                      Entrypoint Preview

                                                                                      Instruction
                                                                                      jmp dword ptr [00402000h]
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al

                                                                                      Data Directories

                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x614800x4b.text
                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x620000x600.rsrc
                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x640000xc.reloc
                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                      Sections

                                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                      .text0x20000x5f4d40x5f600False0.932080910059data7.92573751907IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                      .rsrc0x620000x6000x600False0.442708333333data4.27871469905IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .reloc0x640000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                      Resources

                                                                                      NameRVASizeTypeLanguageCountry
                                                                                      RT_VERSION0x620900x36cdata
                                                                                      RT_MANIFEST0x6240c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                      Imports

                                                                                      DLLImport
                                                                                      mscoree.dll_CorExeMain

                                                                                      Version Infos

                                                                                      DescriptionData
                                                                                      Translation0x0000 0x04b0
                                                                                      LegalCopyrightCopyright Neudesic 2017
                                                                                      Assembly Version1.0.0.0
                                                                                      InternalNameetaib.exe
                                                                                      FileVersion1.0.0.0
                                                                                      CompanyNameNeudesic
                                                                                      LegalTrademarks
                                                                                      Comments
                                                                                      ProductNameVectorBasedDrawing
                                                                                      ProductVersion1.0.0.0
                                                                                      FileDescriptionVectorBasedDrawing
                                                                                      OriginalFilenameetaib.exe

                                                                                      Network Behavior

                                                                                      Network Port Distribution

                                                                                      TCP Packets

                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Feb 24, 2021 08:22:30.782995939 CET4972158103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:22:30.838046074 CET581034972187.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:22:31.439275980 CET4972158103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:22:31.494411945 CET581034972187.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:22:32.048032999 CET4972158103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:22:32.102804899 CET581034972187.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:22:36.311920881 CET4972458103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:22:36.369085073 CET581034972487.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:22:36.939038992 CET4972458103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:22:36.993746042 CET581034972487.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:22:37.548553944 CET4972458103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:22:37.605607033 CET581034972487.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:22:41.738549948 CET4972558103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:22:41.793747902 CET581034972587.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:22:42.439625978 CET4972558103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:22:42.494566917 CET581034972587.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:22:43.049822092 CET4972558103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:22:43.105144024 CET581034972587.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:22:47.114248037 CET4972658103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:22:47.193187952 CET581034972679.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:22:47.705701113 CET4972658103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:22:47.782963037 CET581034972679.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:22:48.283792973 CET4972658103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:22:48.360804081 CET581034972679.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:22:52.548042059 CET4972958103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:22:52.629520893 CET581034972979.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:22:53.143534899 CET4972958103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:22:53.223515987 CET581034972979.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:22:53.737364054 CET4972958103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:22:53.817322016 CET581034972979.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:22:57.850348949 CET4973358103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:22:57.929667950 CET581034973379.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:22:58.472224951 CET4973358103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:22:58.553515911 CET581034973379.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:22:59.175331116 CET4973358103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:22:59.252497911 CET581034973379.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:23:03.373195887 CET4973458103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:03.427895069 CET581034973487.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:04.066615105 CET4973458103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:04.121443987 CET581034973487.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:04.675764084 CET4973458103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:04.730675936 CET581034973487.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:09.127697945 CET4973558103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:09.182590008 CET581034973587.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:09.879338980 CET4973558103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:09.934106112 CET581034973587.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:10.569262981 CET4973558103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:10.626955986 CET581034973587.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:14.746368885 CET4973658103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:14.801103115 CET581034973687.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:15.302474976 CET4973658103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:15.357213020 CET581034973687.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:15.864249945 CET4973658103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:15.919167042 CET581034973687.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:19.929440022 CET4973858103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:23:20.011518955 CET581034973879.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:23:20.520958900 CET4973858103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:23:20.602849007 CET581034973879.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:23:21.115187883 CET4973858103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:23:21.196707964 CET581034973879.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:23:25.241487980 CET4973958103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:23:25.319788933 CET581034973979.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:23:25.833787918 CET4973958103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:23:25.913105965 CET581034973979.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:23:26.427709103 CET4973958103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:23:26.505489111 CET581034973979.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:23:30.523605108 CET4974058103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:23:30.603581905 CET581034974079.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:23:31.115519047 CET4974058103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:23:31.195658922 CET581034974079.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:23:31.709307909 CET4974058103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:23:31.791932106 CET581034974079.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:23:35.948029995 CET4974358103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:36.003094912 CET581034974387.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:36.506711006 CET4974358103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:36.562042952 CET581034974387.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:37.069272041 CET4974358103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:37.124191046 CET581034974387.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:41.241198063 CET4974458103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:41.295802116 CET581034974487.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:41.803934097 CET4974458103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:41.859724998 CET581034974487.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:42.366508961 CET4974458103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:42.421324968 CET581034974487.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:46.646815062 CET4974558103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:46.701983929 CET581034974587.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:47.210638046 CET4974558103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:47.267636061 CET581034974587.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:47.773190022 CET4974558103192.168.2.587.237.165.78
                                                                                      Feb 24, 2021 08:23:47.828268051 CET581034974587.237.165.78192.168.2.5
                                                                                      Feb 24, 2021 08:23:51.837430000 CET4974658103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:23:51.917613029 CET581034974679.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:23:52.425215960 CET4974658103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:23:52.507610083 CET581034974679.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:23:53.008169889 CET4974658103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:23:53.089534998 CET581034974679.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:23:57.104069948 CET4974758103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:23:57.184240103 CET581034974779.134.225.43192.168.2.5
                                                                                      Feb 24, 2021 08:23:57.695939064 CET4974758103192.168.2.579.134.225.43
                                                                                      Feb 24, 2021 08:23:57.776223898 CET581034974779.134.225.43192.168.2.5

                                                                                      UDP Packets

                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Feb 24, 2021 08:21:52.260188103 CET5221253192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:21:52.322455883 CET53522128.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:21:52.366096020 CET5430253192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:21:52.414977074 CET53543028.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:21:53.000411034 CET5378453192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:21:53.022375107 CET6530753192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:21:53.050311089 CET53537848.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:21:53.082479954 CET6434453192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:21:53.094324112 CET53653078.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:21:53.133622885 CET53643448.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:21:53.230941057 CET6206053192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:21:53.233053923 CET6180553192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:21:53.279875994 CET53620608.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:21:53.282114983 CET53618058.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:21:53.415981054 CET5479553192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:21:53.469950914 CET53547958.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:21:54.392311096 CET4955753192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:21:54.442476988 CET53495578.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:21:55.281292915 CET6173353192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:21:55.330447912 CET53617338.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:21:56.149508953 CET6544753192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:21:56.201980114 CET53654478.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:21:56.260215998 CET5244153192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:21:56.310190916 CET53524418.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:21:57.048332930 CET6217653192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:21:57.098763943 CET53621768.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:21:58.168817997 CET5959653192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:21:58.233833075 CET53595968.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:21:59.152137041 CET6529653192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:21:59.212820053 CET53652968.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:22:00.361061096 CET6318353192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:22:00.412805080 CET53631838.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:22:01.188030005 CET6015153192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:22:01.241625071 CET53601518.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:22:02.242263079 CET5696953192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:22:02.294141054 CET53569698.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:22:03.690298080 CET5516153192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:22:03.743562937 CET53551618.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:22:23.757661104 CET5475753192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:22:23.833329916 CET53547578.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:22:30.604545116 CET4999253192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:22:30.663717031 CET53499928.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:22:33.373549938 CET6007553192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:22:33.424674988 CET53600758.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:22:36.250876904 CET5501653192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:22:36.310040951 CET53550168.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:22:41.677490950 CET6434553192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:22:41.736562014 CET53643458.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:22:48.257189035 CET5712853192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:22:48.306087971 CET53571288.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:22:48.452671051 CET5479153192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:22:48.513299942 CET53547918.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:22:53.427459955 CET5046353192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:22:53.482548952 CET53504638.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:22:57.695728064 CET5039453192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:22:57.755152941 CET53503948.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:23:03.313415051 CET5853053192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:23:03.370950937 CET53585308.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:23:09.045413971 CET5381353192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:23:09.108172894 CET53538138.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:23:14.686711073 CET6373253192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:23:14.744349003 CET53637328.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:23:17.985760927 CET5734453192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:23:18.058620930 CET53573448.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:23:33.511554003 CET5445053192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:23:33.563227892 CET53544508.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:23:33.975176096 CET5926153192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:23:34.032975912 CET53592618.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:23:35.872972965 CET5715153192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:23:35.933026075 CET53571518.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:23:41.178101063 CET5941353192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:23:41.238497972 CET53594138.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:23:46.545110941 CET6051653192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:23:46.604031086 CET53605168.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:24:07.702549934 CET5164953192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:24:07.764501095 CET53516498.8.8.8192.168.2.5
                                                                                      Feb 24, 2021 08:24:12.964740038 CET6508653192.168.2.58.8.8.8
                                                                                      Feb 24, 2021 08:24:13.028446913 CET53650868.8.8.8192.168.2.5

                                                                                      DNS Queries

                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                      Feb 24, 2021 08:22:30.604545116 CET192.168.2.58.8.8.80xf3adStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:22:36.250876904 CET192.168.2.58.8.8.80x8e4eStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:22:41.677490950 CET192.168.2.58.8.8.80xab8cStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:23:03.313415051 CET192.168.2.58.8.8.80x19a1Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:23:09.045413971 CET192.168.2.58.8.8.80x52d8Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:23:14.686711073 CET192.168.2.58.8.8.80xa96aStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:23:35.872972965 CET192.168.2.58.8.8.80xcb26Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:23:41.178101063 CET192.168.2.58.8.8.80x7259Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:23:46.545110941 CET192.168.2.58.8.8.80xf593Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:24:07.702549934 CET192.168.2.58.8.8.80xe272Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:24:12.964740038 CET192.168.2.58.8.8.80xbe3dStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)

                                                                                      DNS Answers

                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                      Feb 24, 2021 08:22:30.663717031 CET8.8.8.8192.168.2.50xf3adNo error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:22:36.310040951 CET8.8.8.8192.168.2.50x8e4eNo error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:22:41.736562014 CET8.8.8.8192.168.2.50xab8cNo error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:23:03.370950937 CET8.8.8.8192.168.2.50x19a1No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:23:09.108172894 CET8.8.8.8192.168.2.50x52d8No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:23:14.744349003 CET8.8.8.8192.168.2.50xa96aNo error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:23:35.933026075 CET8.8.8.8192.168.2.50xcb26No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:23:41.238497972 CET8.8.8.8192.168.2.50x7259No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:23:46.604031086 CET8.8.8.8192.168.2.50xf593No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:24:07.764501095 CET8.8.8.8192.168.2.50xe272No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                      Feb 24, 2021 08:24:13.028446913 CET8.8.8.8192.168.2.50xbe3dNo error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)

                                                                                      Code Manipulations

                                                                                      Statistics

                                                                                      Behavior

                                                                                      Click to jump to process

                                                                                      System Behavior

                                                                                      General

                                                                                      Start time:08:22:00
                                                                                      Start date:24/02/2021
                                                                                      Path:C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:'C:\Users\user\Desktop\YoWPu2BQzA9FeDd.exe'
                                                                                      Imagebase:0x50000
                                                                                      File size:393216 bytes
                                                                                      MD5 hash:D89532EEBD77F5BCF86552E5178EB695
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:.Net C# or VB.NET
                                                                                      Yara matches:
                                                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.283047547.0000000003821000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.283047547.0000000003821000.00000004.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.283047547.0000000003821000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                      Reputation:low

                                                                                      General

                                                                                      Start time:08:22:23
                                                                                      Start date:24/02/2021
                                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\jVzJHCyF' /XML 'C:\Users\user\AppData\Local\Temp\tmpA75F.tmp'
                                                                                      Imagebase:0x8b0000
                                                                                      File size:185856 bytes
                                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:08:22:24
                                                                                      Start date:24/02/2021
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff7ecfc0000
                                                                                      File size:625664 bytes
                                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:08:22:24
                                                                                      Start date:24/02/2021
                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:{path}
                                                                                      Imagebase:0x7ff797770000
                                                                                      File size:32768 bytes
                                                                                      MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:.Net C# or VB.NET
                                                                                      Yara matches:
                                                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.506475973.00000000056F0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.506475973.00000000056F0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.505452740.0000000003DF7000.00000004.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.505452740.0000000003DF7000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.494649173.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.494649173.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.494649173.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.506530348.0000000005840000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.506530348.0000000005840000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.506614119.0000000005990000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.506614119.0000000005990000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.506614119.0000000005990000.00000004.00000001.sdmp, Author: Joe Security
                                                                                      Reputation:moderate

                                                                                      General

                                                                                      Start time:08:22:26
                                                                                      Start date:24/02/2021
                                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp525A.tmp'
                                                                                      Imagebase:0x8b0000
                                                                                      File size:185856 bytes
                                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:08:22:27
                                                                                      Start date:24/02/2021
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff7ecfc0000
                                                                                      File size:625664 bytes
                                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:08:22:27
                                                                                      Start date:24/02/2021
                                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5614.tmp'
                                                                                      Imagebase:0x8b0000
                                                                                      File size:185856 bytes
                                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:08:22:28
                                                                                      Start date:24/02/2021
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff7ecfc0000
                                                                                      File size:625664 bytes
                                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:08:22:29
                                                                                      Start date:24/02/2021
                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
                                                                                      Imagebase:0xac0000
                                                                                      File size:32768 bytes
                                                                                      MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:.Net C# or VB.NET
                                                                                      Reputation:moderate

                                                                                      General

                                                                                      Start time:08:22:30
                                                                                      Start date:24/02/2021
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff7ecfc0000
                                                                                      File size:625664 bytes
                                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:08:22:30
                                                                                      Start date:24/02/2021
                                                                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                                                      Imagebase:0x860000
                                                                                      File size:32768 bytes
                                                                                      MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:.Net C# or VB.NET
                                                                                      Antivirus matches:
                                                                                      • Detection: 0%, Metadefender, Browse
                                                                                      • Detection: 0%, ReversingLabs
                                                                                      Reputation:moderate

                                                                                      General

                                                                                      Start time:08:22:30
                                                                                      Start date:24/02/2021
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff7ecfc0000
                                                                                      File size:625664 bytes
                                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:08:22:38
                                                                                      Start date:24/02/2021
                                                                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                                      Imagebase:0x540000
                                                                                      File size:32768 bytes
                                                                                      MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:.Net C# or VB.NET
                                                                                      Reputation:moderate

                                                                                      General

                                                                                      Start time:08:22:39
                                                                                      Start date:24/02/2021
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff7ecfc0000
                                                                                      File size:625664 bytes
                                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      Disassembly

                                                                                      Code Analysis

                                                                                      Reset < >