Loading ...

Play interactive tourEdit tour

Analysis Report 3Fv4j323nj.exe

Overview

General Information

Sample Name:3Fv4j323nj.exe
Analysis ID:357177
MD5:acfcbd916fa04787e4388b339592dd78
SHA1:f2a572347c81b71c3a59f00a37f68db698715460
SHA256:ede5c7b0267f4801a7bebb22a18035923e71a476ceb3b9d94f582aa199deb3f0
Tags:exeGuLoader
Infos:

Most interesting Screenshot:

Detection

Nanocore GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected GuLoader
Yara detected Nanocore RAT
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Abnormal high CPU Usage
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • 3Fv4j323nj.exe (PID: 6520 cmdline: 'C:\Users\user\Desktop\3Fv4j323nj.exe' MD5: ACFCBD916FA04787E4388B339592DD78)
    • RegAsm.exe (PID: 808 cmdline: 'C:\Users\user\Desktop\3Fv4j323nj.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
      • conhost.exe (PID: 1748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 4800 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE4CC.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 3728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5364 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE7FA.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • RegAsm.exe (PID: 5344 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 0 MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • conhost.exe (PID: 5412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 2156 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • conhost.exe (PID: 4000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • filename1.exe (PID: 5044 cmdline: 'C:\Users\user\subfolder1\filename1.exe' MD5: ACFCBD916FA04787E4388B339592DD78)
  • dhcpmon.exe (PID: 5736 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • conhost.exe (PID: 1264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "7c50348d-f4bf-40ba-b0d6-02de82eca13f", "Group": "BIZ SALES", "Domain1": "194.5.98.182", "Domain2": "", "Port": 3765, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000C.00000002.503235354.0000000020790000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xf7ad:$x1: NanoCore.ClientPluginHost
  • 0xf7da:$x2: IClientNetworkHost
0000000C.00000002.503235354.0000000020790000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xf7ad:$x2: NanoCore.ClientPluginHost
  • 0x10888:$s4: PipeCreated
  • 0xf7c7:$s5: IClientLoggingHost
0000000C.00000002.503235354.0000000020790000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000C.00000002.501121759.000000001ED77000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000C.00000002.501121759.000000001ED77000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x13a3d:$a: NanoCore
      • 0x13a96:$a: NanoCore
      • 0x13ad3:$a: NanoCore
      • 0x13b4c:$a: NanoCore
      • 0x271f7:$a: NanoCore
      • 0x2720c:$a: NanoCore
      • 0x27241:$a: NanoCore
      • 0x401bb:$a: NanoCore
      • 0x401d0:$a: NanoCore
      • 0x40205:$a: NanoCore
      • 0x13a9f:$b: ClientPlugin
      • 0x13adc:$b: ClientPlugin
      • 0x143da:$b: ClientPlugin
      • 0x143e7:$b: ClientPlugin
      • 0x26fb3:$b: ClientPlugin
      • 0x26fce:$b: ClientPlugin
      • 0x26ffe:$b: ClientPlugin
      • 0x27215:$b: ClientPlugin
      • 0x2724a:$b: ClientPlugin
      • 0x3ff77:$b: ClientPlugin
      • 0x3ff92:$b: ClientPlugin
      Click to see the 6 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      12.2.RegAsm.exe.1dd516dc.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      12.2.RegAsm.exe.1dd516dc.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      12.2.RegAsm.exe.1ed8ea94.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xf7ad:$x1: NanoCore.ClientPluginHost
      • 0x28771:$x1: NanoCore.ClientPluginHost
      • 0xf7da:$x2: IClientNetworkHost
      • 0x2879e:$x2: IClientNetworkHost
      12.2.RegAsm.exe.1ed8ea94.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xf7ad:$x2: NanoCore.ClientPluginHost
      • 0x28771:$x2: NanoCore.ClientPluginHost
      • 0x10888:$s4: PipeCreated
      • 0x2984c:$s4: PipeCreated
      • 0xf7c7:$s5: IClientLoggingHost
      • 0x2878b:$s5: IClientLoggingHost
      12.2.RegAsm.exe.1ed8ea94.5.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 21 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, ProcessId: 808, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE4CC.tmp', CommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE4CC.tmp', CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\3Fv4j323nj.exe' , ParentImage: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, ParentProcessId: 808, ProcessCommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE4CC.tmp', ProcessId: 4800

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 0000000C.00000002.501121759.000000001ED77000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "7c50348d-f4bf-40ba-b0d6-02de82eca13f", "Group": "BIZ SALES", "Domain1": "194.5.98.182", "Domain2": "", "Port": 3765, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Multi AV Scanner detection for submitted fileShow sources
        Source: 3Fv4j323nj.exeVirustotal: Detection: 12%Perma Link
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000C.00000002.503235354.0000000020790000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.501121759.000000001ED77000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 808, type: MEMORY
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed8ea94.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed8ea94.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.20790000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed930bd.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.20790000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.20794629.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed89c5e.3.raw.unpack, type: UNPACKEDPE
        Source: 12.2.RegAsm.exe.20790000.10.unpackAvira: Label: TR/NanoCore.fadte

        Compliance:

        barindex
        Uses 32bit PE filesShow sources
        Source: 3Fv4j323nj.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Uses new MSVCR DllsShow sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Binary contains paths to debug symbolsShow sources
        Source: Binary string: C:\Windows\exe\RegAsm.pdb source: RegAsm.exe, 0000000C.00000002.499348814.000000001DC35000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\symbols\exe\RegAsm.pdb source: RegAsm.exe, 0000000C.00000002.499348814.000000001DC35000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.pdb source: RegAsm.exe, 0000000C.00000002.499348814.000000001DC35000.00000004.00000040.sdmp
        Source: Binary string: RegAsm.pdb source: dhcpmon.exe, dhcpmon.exe.12.dr
        Source: Binary string: indows\RegAsm.pdbpdbAsm.pdb source: RegAsm.exe, 0000000C.00000002.499348814.000000001DC35000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\RegAsm.pdb~ source: RegAsm.exe, 0000000C.00000002.499348814.000000001DC35000.00000004.00000040.sdmp
        Source: Binary string: mscorrc.pdb source: RegAsm.exe, 0000000C.00000002.502805813.00000000204A0000.00000002.00000001.sdmp

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs:
        Source: Malware configuration extractorURLs: 194.5.98.182
        Source: global trafficTCP traffic: 192.168.2.3:49743 -> 194.5.98.182:3765
        Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.182
        Source: unknownDNS traffic detected: queries for: onedrive.live.com
        Source: RegAsm.exe, RegAsm.exe, 0000000C.00000002.482199109.0000000001002000.00000040.00000001.sdmpString found in binary or memory: https://onedrive.live.com/download?cid=F57CEB019EB26E7D&resid=F57CEB019EB26E7D%21106&authkey=AHaSu1X
        Source: RegAsm.exe, 0000000C.00000002.503235354.0000000020790000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000C.00000002.503235354.0000000020790000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.501121759.000000001ED77000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 808, type: MEMORY
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed8ea94.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed8ea94.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.20790000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed930bd.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.20790000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.20794629.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed89c5e.3.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 0000000C.00000002.503235354.0000000020790000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000002.501121759.000000001ED77000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.502878730.0000000020500000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegAsm.exe PID: 808, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.RegAsm.exe.1dd516dc.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.RegAsm.exe.1ed8ea94.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.RegAsm.exe.1ed8ea94.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.RegAsm.exe.20790000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.RegAsm.exe.20500000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.RegAsm.exe.1ed930bd.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.RegAsm.exe.20790000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.RegAsm.exe.20794629.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.RegAsm.exe.1ed89c5e.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.RegAsm.exe.1ed89c5e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeProcess Stats: CPU usage > 98%
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_0100700D NtProtectVirtualMemory,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010074F1 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01007509 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01007521 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01007538 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01007555 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01007167 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01007587 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_0100759D NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010075B2 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010075E4 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010075FD NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_0100700B LoadLibraryA,NtProtectVirtualMemory,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_0100704C NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_0100744E NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01007063 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01007086 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010070A5 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010070BC NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01007707 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01007727 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01006FB1 NtProtectVirtualMemory,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01006FCB NtProtectVirtualMemory,NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01007615 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01007635 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_0100764D NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010076A6 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_200A16DA NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_200A169F NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01006599
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF623A0
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF62FA8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF6B2A8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF689D8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF6969F
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF695D8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF6306F
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 24_2_048401B7
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_00409851
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_0040987E
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_00409828
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_004098D6
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_0040990A
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_00409932
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_004099DD
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_0040998E
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_004099B7
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_00409A62
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_00409A09
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_00409AC1
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_00409AF2
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_00409A94
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_00409B48
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_0040976B
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_00409B1E
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_00409739
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_00409BC3
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_004097CB
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_004093F4
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_004097FA
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_00409798
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_00405934
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 30_2_022D01B7
        Source: 3Fv4j323nj.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: 3Fv4j323nj.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: 3Fv4j323nj.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: filename1.exe.12.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: filename1.exe.12.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: filename1.exe.12.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: 3Fv4j323nj.exe, 00000000.00000000.213468397.0000000000417000.00000002.00020000.sdmpBinary or memory string: OriginalFilenametrenchlet.exe vs 3Fv4j323nj.exe
        Source: 3Fv4j323nj.exeBinary or memory string: OriginalFilenametrenchlet.exe vs 3Fv4j323nj.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
        Source: 3Fv4j323nj.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: 0000000C.00000002.503235354.0000000020790000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000002.503235354.0000000020790000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000000C.00000002.501121759.000000001ED77000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.502878730.0000000020500000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000002.502878730.0000000020500000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: Process Memory Space: RegAsm.exe PID: 808, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.RegAsm.exe.1dd516dc.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.RegAsm.exe.1dd516dc.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.RegAsm.exe.1ed8ea94.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.RegAsm.exe.1ed8ea94.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.RegAsm.exe.1ed8ea94.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.RegAsm.exe.1ed8ea94.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.RegAsm.exe.20790000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.RegAsm.exe.20790000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.RegAsm.exe.20500000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.RegAsm.exe.20500000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.RegAsm.exe.1ed930bd.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.RegAsm.exe.1ed930bd.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.RegAsm.exe.20790000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.RegAsm.exe.20790000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.RegAsm.exe.20794629.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.RegAsm.exe.20794629.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.RegAsm.exe.1ed89c5e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.RegAsm.exe.1ed89c5e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.RegAsm.exe.1ed89c5e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: classification engineClassification label: mal100.troj.evad.winEXE@17/11@2/1
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_200A149A AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_200A1463 AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Users\user\subfolder1Jump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1748:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3728:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5412:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4000:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5384:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1264:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{7c50348d-f4bf-40ba-b0d6-02de82eca13f}
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeFile created: C:\Users\user\AppData\Local\Temp\~DF6F7E0F224F5694D5.TMPJump to behavior
        Source: 3Fv4j323nj.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
        Source: C:\Users\user\subfolder1\filename1.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: 3Fv4j323nj.exeVirustotal: Detection: 12%
        Source: unknownProcess created: C:\Users\user\Desktop\3Fv4j323nj.exe 'C:\Users\user\Desktop\3Fv4j323nj.exe'
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\3Fv4j323nj.exe'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE4CC.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE7FA.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 0
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\subfolder1\filename1.exe 'C:\Users\user\subfolder1\filename1.exe'
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\3Fv4j323nj.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE4CC.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE7FA.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: Binary string: C:\Windows\exe\RegAsm.pdb source: RegAsm.exe, 0000000C.00000002.499348814.000000001DC35000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\symbols\exe\RegAsm.pdb source: RegAsm.exe, 0000000C.00000002.499348814.000000001DC35000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.pdb source: RegAsm.exe, 0000000C.00000002.499348814.000000001DC35000.00000004.00000040.sdmp
        Source: Binary string: RegAsm.pdb source: dhcpmon.exe, dhcpmon.exe.12.dr
        Source: Binary string: indows\RegAsm.pdbpdbAsm.pdb source: RegAsm.exe, 0000000C.00000002.499348814.000000001DC35000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\RegAsm.pdb~ source: RegAsm.exe, 0000000C.00000002.499348814.000000001DC35000.00000004.00000040.sdmp
        Source: Binary string: mscorrc.pdb source: RegAsm.exe, 0000000C.00000002.502805813.00000000204A0000.00000002.00000001.sdmp

        Data Obfuscation:

        barindex
        Yara detected GuLoaderShow sources
        Source: Yara matchFile source: 0000000C.00000002.482199109.0000000001002000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 808, type: MEMORY
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01006C27 push eax; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01006C41 push eax; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1DBA74B8 push ebp; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1DBA74AC push ecx; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1DBAAAF0 push cs; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1DBAABD8 push cs; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1DBA9D73 pushad ; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1DBAAB64 push cs; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF64369 push esi; retn 001Dh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF64339 push ebp; retn 001Dh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF64269 push ebp; retn 001Dh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF645B9 push edi; retn 001Dh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF661A0 push esp; retn 001Dh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF64180 push ebp; retn 001Dh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF63970 push ecx; retn 001Dh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF60170 pushad ; retn 001Dh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF60961 push 16B2E872h; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF6096D push ss; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF60D59 push 12B5E872h; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF63D40 push esp; retn 001Dh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF64127 push esp; retn 001Dh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF64511 push edi; retn 001Dh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF65911 pushad ; retn 001Dh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF638F8 push eax; retn F81Dh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF640D1 push esp; retn 001Dh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_1FF65831 pushad ; retn 001Dh
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_0040E4E3 push ecx; ret
        Source: C:\Users\user\subfolder1\filename1.exeCode function: 29_2_0040BE2F push esi; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Users\user\subfolder1\filename1.exeJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE4CC.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010074F1 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010043E9 InternetOpenA,InternetOpenUrlA,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002D02
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01003125
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002D2D
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002D73
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002D8D
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002DAA
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002DC5
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002DEE
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01003019
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_0100302B
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002C4B
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_0100704C NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01007063 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002C69
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002C81
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01007086 NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01003092
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002C97
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010030B5
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002CB5
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002CE3
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010030EF
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002F0D
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002F71
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002F85
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002FC1
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01006FCB NtProtectVirtualMemory,NtQueryInformationProcess,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002FD2
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002BF5
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002E1D
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002E4C
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002E6D
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002EB2
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002EC4
        Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeRDTSC instruction interceptor: First address: 0000000000667097 second address: 0000000000667097 instructions:
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeRDTSC instruction interceptor: First address: 00000000006639D5 second address: 00000000006639D5 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F46849B7C88h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d jmp 00007F46849B7C92h 0x0000001f test bx, FB3Ch 0x00000024 cmp bh, bh 0x00000026 pop ecx 0x00000027 add edi, edx 0x00000029 dec ecx 0x0000002a cmp ecx, 00000000h 0x0000002d jne 00007F46849B7C24h 0x0000002f jmp 00007F46849B7C92h 0x00000031 push ss 0x00000032 pop ss 0x00000033 jmp 00007F46849B7C8Dh 0x00000035 push ecx 0x00000036 jmp 00007F46849B7C92h 0x00000038 test dx, dx 0x0000003b call 00007F46849B7CDFh 0x00000040 call 00007F46849B7C98h 0x00000045 lfence 0x00000048 mov edx, dword ptr [7FFE0014h] 0x0000004e lfence 0x00000051 ret 0x00000052 mov esi, edx 0x00000054 pushad 0x00000055 rdtsc
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeRDTSC instruction interceptor: First address: 0000000000660F13 second address: 0000000000660F13 instructions:
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeRDTSC instruction interceptor: First address: 0000000000662D13 second address: 0000000000662D13 instructions:
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeRDTSC instruction interceptor: First address: 00000000006632EE second address: 00000000006632EE instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001000FE0 second address: 0000000001000FE0 instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001001093 second address: 0000000001001093 instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001001166 second address: 0000000001001166 instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001001216 second address: 0000000001001216 instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001004496 second address: 0000000001004496 instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 00000000010045F2 second address: 00000000010045F2 instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 000000000100220E second address: 000000000100220E instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001002398 second address: 000000000100243D instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a jmp 00007F46848E3042h 0x0000000c cmp ax, 00002355h 0x00000010 call 00007F46848E369Bh 0x00000015 cmp dword ptr [edi+00000818h], 00000000h 0x0000001c je 00007F46848E3115h 0x00000022 ret 0x00000023 test edx, ecx 0x00000025 mov eax, dword ptr fs:[00000030h] 0x0000002b mov eax, dword ptr [eax+0Ch] 0x0000002e mov eax, dword ptr [eax+0Ch] 0x00000031 jmp 00007F46848E3042h 0x00000033 test dx, dx 0x00000036 mov ecx, dword ptr [edi+00000808h] 0x0000003c jmp 00007F46848E3037h 0x0000003e mov dword ptr [eax+20h], ecx 0x00000041 jmp 00007F46848E3042h 0x00000043 cmp ah, ch 0x00000045 mov esi, dword ptr [edi+00000800h] 0x0000004b jmp 00007F46848E3042h 0x0000004d fnop 0x0000004f mov dword ptr [eax+18h], esi 0x00000052 add esi, dword ptr [edi+00000850h] 0x00000058 mov dword ptr [eax+1Ch], esi 0x0000005b jmp 00007F46848E3042h 0x0000005d pushad 0x0000005e rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 000000000100243D second address: 00000000010024DF instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a jmp 00007F46849B7C92h 0x0000000c cmp ax, 0000D992h 0x00000010 test edx, ecx 0x00000012 cmp dword ptr [ebp+70h], 01h 0x00000016 je 00007F46849B7DFCh 0x0000001c mov esi, edi 0x0000001e add esi, 00001000h 0x00000024 xor ecx, ecx 0x00000026 push ecx 0x00000027 jmp 00007F46849B7C92h 0x00000029 test dx, dx 0x0000002c push edi 0x0000002d mov eax, ebp 0x0000002f add eax, 0000009Ch 0x00000034 push eax 0x00000035 call 00007F46849B8315h 0x0000003a jmp 00007F46849B7C92h 0x0000003c jmp 00007F46849B7C9Ah 0x0000003e test ch, ch 0x00000040 cmp dword ptr [esi+24h], E0000020h 0x00000047 je 00007F46849B7D54h 0x0000004d cmp dword ptr [esi+24h], 60000020h 0x00000054 je 00007F46849B7DC3h 0x0000005a mov ebx, 00000020h 0x0000005f jmp 00007F46849B7C96h 0x00000061 ret 0x00000062 push ebx 0x00000063 jmp 00007F46849B7C92h 0x00000065 cmp ah, ch 0x00000067 mov eax, esi 0x00000069 jmp 00007F46849B7C92h 0x0000006b fnop 0x0000006d add eax, 08h 0x00000070 push eax 0x00000071 mov eax, dword ptr [edi+00000800h] 0x00000077 jmp 00007F46849B7C92h 0x00000079 pushad 0x0000007a rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 00000000010024DF second address: 00000000010024DF instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001002599 second address: 0000000001002599 instructions:
        Tries to detect Any.runShow sources
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: RegAsm.exeBinary or memory string: U-GA\QEMU-GA.EXE
        Source: RegAsm.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
        Tries to detect virtualization through RDTSC time measurementsShow sources
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeRDTSC instruction interceptor: First address: 0000000000667097 second address: 0000000000667097 instructions:
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeRDTSC instruction interceptor: First address: 00000000006639D5 second address: 00000000006639D5 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F46849B7C88h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d jmp 00007F46849B7C92h 0x0000001f test bx, FB3Ch 0x00000024 cmp bh, bh 0x00000026 pop ecx 0x00000027 add edi, edx 0x00000029 dec ecx 0x0000002a cmp ecx, 00000000h 0x0000002d jne 00007F46849B7C24h 0x0000002f jmp 00007F46849B7C92h 0x00000031 push ss 0x00000032 pop ss 0x00000033 jmp 00007F46849B7C8Dh 0x00000035 push ecx 0x00000036 jmp 00007F46849B7C92h 0x00000038 test dx, dx 0x0000003b call 00007F46849B7CDFh 0x00000040 call 00007F46849B7C98h 0x00000045 lfence 0x00000048 mov edx, dword ptr [7FFE0014h] 0x0000004e lfence 0x00000051 ret 0x00000052 mov esi, edx 0x00000054 pushad 0x00000055 rdtsc
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeRDTSC instruction interceptor: First address: 0000000000663C6A second address: 0000000000663C6A instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F46848E55B2h 0x0000001d popad 0x0000001e call 00007F46848E307Dh 0x00000023 lfence 0x00000026 rdtsc
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeRDTSC instruction interceptor: First address: 0000000000666A3C second address: 0000000000666B00 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+18h] 0x0000000f jmp 00007F46849B7C92h 0x00000011 cmp bl, FFFFFFE7h 0x00000014 mov byte ptr [eax], FFFFFF90h 0x00000017 jmp 00007F46849B7C92h 0x00000019 cmp ax, dx 0x0000001c mov eax, dword ptr [esp+1Ch] 0x00000020 mov byte ptr [eax], 0000006Ah 0x00000023 jmp 00007F46849B7C92h 0x00000025 jmp 00007F46849B7C9Eh 0x00000027 mov byte ptr [eax+01h], 00000000h 0x0000002b mov byte ptr [eax+02h], FFFFFFB8h 0x0000002f jmp 00007F46849B7C92h 0x00000031 test ax, cx 0x00000034 mov edx, dword ptr [ebp+0000013Ch] 0x0000003a mov dword ptr [eax+03h], edx 0x0000003d jmp 00007F46849B7C92h 0x0000003f cmp dx, cx 0x00000042 jmp 00007F46849B7C92h 0x00000044 pushad 0x00000045 lfence 0x00000048 rdtsc
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeRDTSC instruction interceptor: First address: 0000000000666B00 second address: 0000000000666BBF instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov byte ptr [eax+07h], FFFFFFFFh 0x0000000f jmp 00007F46848E3042h 0x00000011 cmp bl, 00000038h 0x00000014 mov byte ptr [eax+08h], FFFFFFD0h 0x00000018 jmp 00007F46848E3042h 0x0000001a cmp ax, dx 0x0000001d mov byte ptr [eax+09h], FFFFFFC2h 0x00000021 mov byte ptr [eax+0Ah], 00000004h 0x00000025 mov byte ptr [eax+0Bh], 00000000h 0x00000029 jmp 00007F46848E3042h 0x0000002b jmp 00007F46848E304Eh 0x0000002d jmp 00007F46848E3042h 0x0000002f test ax, cx 0x00000032 mov eax, ebx 0x00000034 jmp 00007F46848E3042h 0x00000036 cmp dx, cx 0x00000039 add eax, dword ptr [esp+08h] 0x0000003d jmp 00007F46848E3042h 0x0000003f pushad 0x00000040 lfence 0x00000043 rdtsc
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeRDTSC instruction interceptor: First address: 0000000000666BBF second address: 0000000000666BBF instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b inc ebx 0x0000000c cmp ebx, eax 0x0000000e je 00007F46849B7EA5h 0x00000014 jmp 00007F46849B7C92h 0x00000016 cmp bl, 00000041h 0x00000019 cmp byte ptr [ebx], FFFFFFB8h 0x0000001c jne 00007F46849B7C3Eh 0x0000001e jmp 00007F46849B7C92h 0x00000020 pushad 0x00000021 lfence 0x00000024 rdtsc
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeRDTSC instruction interceptor: First address: 000000000066767F second address: 00000000006676BA instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov eax, dword ptr [edi+00005000h] 0x00000011 cmp dword ptr [eax+04h], 00000000h 0x00000015 jne 00007F46848E3186h 0x0000001b cmp dword ptr [eax+08h], 00000000h 0x0000001f jne 00007F46848E317Ch 0x00000025 jmp 00007F46848E3042h 0x00000027 pushad 0x00000028 lfence 0x0000002b rdtsc
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeRDTSC instruction interceptor: First address: 0000000000660F13 second address: 0000000000660F13 instructions:
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeRDTSC instruction interceptor: First address: 0000000000662D13 second address: 0000000000662D13 instructions:
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeRDTSC instruction interceptor: First address: 00000000006632EE second address: 00000000006632EE instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001003C6A second address: 0000000001003C6A instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F46848E55B2h 0x0000001d popad 0x0000001e call 00007F46848E307Dh 0x00000023 lfence 0x00000026 rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001006A3C second address: 0000000001006B00 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+18h] 0x0000000f jmp 00007F46849B7C92h 0x00000011 cmp bl, FFFFFFE7h 0x00000014 mov byte ptr [eax], FFFFFF90h 0x00000017 jmp 00007F46849B7C92h 0x00000019 cmp ax, dx 0x0000001c mov eax, dword ptr [esp+1Ch] 0x00000020 mov byte ptr [eax], 0000006Ah 0x00000023 jmp 00007F46849B7C92h 0x00000025 jmp 00007F46849B7C9Eh 0x00000027 mov byte ptr [eax+01h], 00000000h 0x0000002b mov byte ptr [eax+02h], FFFFFFB8h 0x0000002f jmp 00007F46849B7C92h 0x00000031 test ax, cx 0x00000034 mov edx, dword ptr [ebp+0000013Ch] 0x0000003a mov dword ptr [eax+03h], edx 0x0000003d jmp 00007F46849B7C92h 0x0000003f cmp dx, cx 0x00000042 jmp 00007F46849B7C92h 0x00000044 pushad 0x00000045 lfence 0x00000048 rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001006B00 second address: 0000000001006BBF instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov byte ptr [eax+07h], FFFFFFFFh 0x0000000f jmp 00007F46848E3042h 0x00000011 cmp bl, 00000038h 0x00000014 mov byte ptr [eax+08h], FFFFFFD0h 0x00000018 jmp 00007F46848E3042h 0x0000001a cmp ax, dx 0x0000001d mov byte ptr [eax+09h], FFFFFFC2h 0x00000021 mov byte ptr [eax+0Ah], 00000004h 0x00000025 mov byte ptr [eax+0Bh], 00000000h 0x00000029 jmp 00007F46848E3042h 0x0000002b jmp 00007F46848E304Eh 0x0000002d jmp 00007F46848E3042h 0x0000002f test ax, cx 0x00000032 mov eax, ebx 0x00000034 jmp 00007F46848E3042h 0x00000036 cmp dx, cx 0x00000039 add eax, dword ptr [esp+08h] 0x0000003d jmp 00007F46848E3042h 0x0000003f pushad 0x00000040 lfence 0x00000043 rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001006BBF second address: 0000000001006BBF instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b inc ebx 0x0000000c cmp ebx, eax 0x0000000e je 00007F46849B7EA5h 0x00000014 jmp 00007F46849B7C92h 0x00000016 cmp bl, 00000041h 0x00000019 cmp byte ptr [ebx], FFFFFFB8h 0x0000001c jne 00007F46849B7C3Eh 0x0000001e jmp 00007F46849B7C92h 0x00000020 pushad 0x00000021 lfence 0x00000024 rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 000000000100767F second address: 00000000010076BA instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov eax, dword ptr [edi+00005000h] 0x00000011 cmp dword ptr [eax+04h], 00000000h 0x00000015 jne 00007F46848E3186h 0x0000001b cmp dword ptr [eax+08h], 00000000h 0x0000001f jne 00007F46848E317Ch 0x00000025 jmp 00007F46848E3042h 0x00000027 pushad 0x00000028 lfence 0x0000002b rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001000FE0 second address: 0000000001000FE0 instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001001093 second address: 0000000001001093 instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001001166 second address: 0000000001001166 instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001001216 second address: 0000000001001216 instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001004496 second address: 0000000001004496 instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 00000000010045F2 second address: 00000000010045F2 instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 000000000100220E second address: 000000000100220E instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001002398 second address: 000000000100243D instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a jmp 00007F46848E3042h 0x0000000c cmp ax, 00002355h 0x00000010 call 00007F46848E369Bh 0x00000015 cmp dword ptr [edi+00000818h], 00000000h 0x0000001c je 00007F46848E3115h 0x00000022 ret 0x00000023 test edx, ecx 0x00000025 mov eax, dword ptr fs:[00000030h] 0x0000002b mov eax, dword ptr [eax+0Ch] 0x0000002e mov eax, dword ptr [eax+0Ch] 0x00000031 jmp 00007F46848E3042h 0x00000033 test dx, dx 0x00000036 mov ecx, dword ptr [edi+00000808h] 0x0000003c jmp 00007F46848E3037h 0x0000003e mov dword ptr [eax+20h], ecx 0x00000041 jmp 00007F46848E3042h 0x00000043 cmp ah, ch 0x00000045 mov esi, dword ptr [edi+00000800h] 0x0000004b jmp 00007F46848E3042h 0x0000004d fnop 0x0000004f mov dword ptr [eax+18h], esi 0x00000052 add esi, dword ptr [edi+00000850h] 0x00000058 mov dword ptr [eax+1Ch], esi 0x0000005b jmp 00007F46848E3042h 0x0000005d pushad 0x0000005e rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 000000000100243D second address: 00000000010024DF instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a jmp 00007F46849B7C92h 0x0000000c cmp ax, 0000D992h 0x00000010 test edx, ecx 0x00000012 cmp dword ptr [ebp+70h], 01h 0x00000016 je 00007F46849B7DFCh 0x0000001c mov esi, edi 0x0000001e add esi, 00001000h 0x00000024 xor ecx, ecx 0x00000026 push ecx 0x00000027 jmp 00007F46849B7C92h 0x00000029 test dx, dx 0x0000002c push edi 0x0000002d mov eax, ebp 0x0000002f add eax, 0000009Ch 0x00000034 push eax 0x00000035 call 00007F46849B8315h 0x0000003a jmp 00007F46849B7C92h 0x0000003c jmp 00007F46849B7C9Ah 0x0000003e test ch, ch 0x00000040 cmp dword ptr [esi+24h], E0000020h 0x00000047 je 00007F46849B7D54h 0x0000004d cmp dword ptr [esi+24h], 60000020h 0x00000054 je 00007F46849B7DC3h 0x0000005a mov ebx, 00000020h 0x0000005f jmp 00007F46849B7C96h 0x00000061 ret 0x00000062 push ebx 0x00000063 jmp 00007F46849B7C92h 0x00000065 cmp ah, ch 0x00000067 mov eax, esi 0x00000069 jmp 00007F46849B7C92h 0x0000006b fnop 0x0000006d add eax, 08h 0x00000070 push eax 0x00000071 mov eax, dword ptr [edi+00000800h] 0x00000077 jmp 00007F46849B7C92h 0x00000079 pushad 0x0000007a rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 00000000010024DF second address: 00000000010024DF instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001002599 second address: 0000000001002599 instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010074F1 rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5348Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5400Thread sleep time: -60000s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5896Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6624Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6820Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_200A11C2 GetSystemInfo,
        Source: RegAsm.exe, 0000000C.00000002.502925857.0000000020650000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: RegAsm.exeBinary or memory string: u-ga\qemu-ga.exe
        Source: RegAsm.exe, 0000000C.00000002.502925857.0000000020650000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: RegAsm.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: RegAsm.exe, 0000000C.00000002.502925857.0000000020650000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: RegAsm.exe, 0000000C.00000002.502925857.0000000020650000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information queried: ProcessInformation

        Anti Debugging:

        barindex
        Hides threads from debuggersShow sources
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeThread information set: HideFromDebugger
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeProcess queried: DebugPort
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010074F1 rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01004A0D LdrInitializeThunk,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01005D79 mov eax, dword ptr fs:[00000030h]
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01005851 mov eax, dword ptr fs:[00000030h]
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01006852 mov eax, dword ptr fs:[00000030h]
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01006888 mov eax, dword ptr fs:[00000030h]
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01006899 mov eax, dword ptr fs:[00000030h]
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010068C1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010068D5 mov eax, dword ptr fs:[00000030h]
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010037B7 mov eax, dword ptr fs:[00000030h]
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_010037BD mov eax, dword ptr fs:[00000030h]
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess token adjusted: Debug
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe base: 1000000
        Source: C:\Users\user\Desktop\3Fv4j323nj.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\3Fv4j323nj.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE4CC.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE7FA.tmp'
        Source: RegAsm.exe, 0000000C.00000002.499790229.000000001DE11000.00000004.00000001.sdmp, filename1.exe, 0000001D.00000002.485586351.0000000000D70000.00000002.00000001.sdmpBinary or memory string: Program Manager
        Source: RegAsm.exe, 0000000C.00000002.485410542.0000000001950000.00000002.00000001.sdmp, filename1.exe, 0000001D.00000002.485586351.0000000000D70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: RegAsm.exe, 0000000C.00000002.502583683.00000000200C5000.00000004.00000001.sdmpBinary or memory string: Program Manager (x86)\DHCP Monitor\dhcpmon.exeh
        Source: RegAsm.exe, 0000000C.00000002.485410542.0000000001950000.00000002.00000001.sdmp, filename1.exe, 0000001D.00000002.485586351.0000000000D70000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: RegAsm.exe, 0000000C.00000002.485410542.0000000001950000.00000002.00000001.sdmp, filename1.exe, 0000001D.00000002.485586351.0000000000D70000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: RegAsm.exe, 0000000C.00000002.502583683.00000000200C5000.00000004.00000001.sdmpBinary or memory string: Program Manager (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_01002FD2 cpuid
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000C.00000002.503235354.0000000020790000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.501121759.000000001ED77000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 808, type: MEMORY
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed8ea94.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed8ea94.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.20790000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed930bd.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.20790000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.20794629.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed89c5e.3.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: RegAsm.exe, 0000000C.00000002.503235354.0000000020790000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegAsm.exe, 0000000C.00000002.501121759.000000001ED77000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000C.00000002.503235354.0000000020790000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.501121759.000000001ED77000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 808, type: MEMORY
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed8ea94.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed8ea94.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.20790000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed930bd.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.20790000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.20794629.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.RegAsm.exe.1ed89c5e.3.raw.unpack, type: UNPACKEDPE
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_200A28F6 bind,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 12_2_200A28C3 bind,

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Access Token Manipulation1Masquerading2Input Capture11Security Software Discovery621Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobRegistry Run Keys / Startup Folder1Process Injection112Virtualization/Sandbox Evasion23LSASS MemoryVirtualization/Sandbox Evasion23Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)DLL Side-Loading1Scheduled Task/Job1Disable or Modify Tools1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Registry Run Keys / Startup Folder1Access Token Manipulation1NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptDLL Side-Loading1Process Injection112LSA SecretsSystem Information Discovery313SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)DLL Side-Loading1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 357177 Sample: 3Fv4j323nj.exe Startdate: 24/02/2021 Architecture: WINDOWS Score: 100 55 Found malware configuration 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 Sigma detected: Scheduled temp file as task from temp location 2->59 61 8 other signatures 2->61 8 3Fv4j323nj.exe 1 2->8         started        11 RegAsm.exe 4 2->11         started        14 dhcpmon.exe 4 2->14         started        16 2 other processes 2->16 process3 file4 71 Writes to foreign memory regions 8->71 73 Detected RDTSC dummy instruction sequence (likely for instruction hammering) 8->73 75 Tries to detect Any.run 8->75 77 2 other signatures 8->77 18 RegAsm.exe 2 22 8->18         started        47 C:\Users\user\AppData\...\RegAsm.exe.log, ASCII 11->47 dropped 23 conhost.exe 11->23         started        25 conhost.exe 14->25         started        27 conhost.exe 16->27         started        signatures5 process6 dnsIp7 49 194.5.98.182, 3765, 49743, 49744 DANILENKODE Netherlands 18->49 51 onedrive.live.com 18->51 53 2 other IPs or domains 18->53 39 C:\Users\user\AppData\Roaming\...\run.dat, COM 18->39 dropped 41 C:\Users\user\AppData\Local\...\tmpE4CC.tmp, XML 18->41 dropped 43 C:\Users\user\subfolder1\filename1.exe, PE32 18->43 dropped 45 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->45 dropped 63 Contains functionality to detect hardware virtualization (CPUID execution measurement) 18->63 65 Detected RDTSC dummy instruction sequence (likely for instruction hammering) 18->65 67 Tries to detect Any.run 18->67 69 3 other signatures 18->69 29 schtasks.exe 1 18->29         started        31 schtasks.exe 1 18->31         started        33 conhost.exe 18->33         started        file8 signatures9 process10 process11 35 conhost.exe 29->35         started        37 conhost.exe 31->37         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        3Fv4j323nj.exe13%VirustotalBrowse
        3Fv4j323nj.exe6%ReversingLabsWin32.Infostealer.Generic

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%VirustotalBrowse
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs
        C:\Users\user\subfolder1\filename1.exe7%ReversingLabsWin32.Infostealer.Generic

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        12.2.RegAsm.exe.20790000.10.unpack100%AviraTR/NanoCore.fadteDownload File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        0%Avira URL Cloudsafe
        194.5.98.1820%VirustotalBrowse
        194.5.98.1820%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        onedrive.live.com
        unknown
        unknownfalse
          high
          cbavwq.bl.files.1drv.com
          unknown
          unknownfalse
            high

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            true
            • Avira URL Cloud: safe
            low
            194.5.98.182true
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            https://onedrive.live.com/download?cid=F57CEB019EB26E7D&resid=F57CEB019EB26E7D%21106&authkey=AHaSu1XRegAsm.exe, RegAsm.exe, 0000000C.00000002.482199109.0000000001002000.00000040.00000001.sdmpfalse
              high

              Contacted IPs

              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs

              Public

              IPDomainCountryFlagASNASN NameMalicious
              194.5.98.182
              unknownNetherlands
              208476DANILENKODEtrue

              General Information

              Joe Sandbox Version:31.0.0 Emerald
              Analysis ID:357177
              Start date:24.02.2021
              Start time:09:17:04
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 10m 45s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:3Fv4j323nj.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:32
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@17/11@2/1
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 79.1% (good quality ratio 35.3%)
              • Quality average: 22.8%
              • Quality standard deviation: 30.5%
              HCA Information:
              • Successful, ratio: 98%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .exe
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
              • Excluded IPs from analysis (whitelisted): 13.64.90.137, 131.253.33.200, 13.107.22.200, 184.30.21.219, 92.122.145.220, 168.61.161.212, 104.43.139.144, 184.30.20.56, 13.88.21.125, 40.88.32.150, 2.20.142.209, 2.20.142.210, 51.103.5.159, 51.104.139.180, 104.42.151.234, 13.107.42.13, 13.107.42.12, 92.122.213.194, 92.122.213.247
              • Excluded domains from analysis (whitelisted): storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, au.download.windowsupdate.com.edgesuite.net, odc-web-brs.onedrive.akadns.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, storeedgefd.xbetservices.akadns.net, arc.msn.com, vip1-par02p.wns.notify.trafficmanager.net, l-0004.l-msedge.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, wns.notify.trafficmanager.net, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, l-0003.l-msedge.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, odc-bl-files-brs.onedrive.akadns.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, odc-bl-files-geo.onedrive.akadns.net, au-bg-shim.trafficmanager.net, storeedgefd.dsx.mp.microsoft.com, www.bing.com, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, odc-web-geo.onedrive.akadns.net, bl-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, storeedgefd.dsx.mp.microsoft.com.edgekey.net, dual-a-0001.dc-msedge.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, e16646.dscg.akamaiedge.net, skypedataprdcolwus15.cloudapp.net, skypedataprdcolwus16.cloudapp.net
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.

              Simulations

              Behavior and APIs

              TimeTypeDescription
              09:19:38AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\subfolder1\filename1.exe
              09:19:41Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" s>$(Arg0)
              09:19:41Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
              09:19:41API Interceptor167x Sleep call for process: RegAsm.exe modified
              09:19:47AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              09:19:55AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\subfolder1\filename1.exe

              Joe Sandbox View / Context

              IPs

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              194.5.98.182PO AAN2102002-V020.docGet hashmaliciousBrowse

                Domains

                No context

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                DANILENKODEscan09e8902093922023ce.exeGet hashmaliciousBrowse
                • 194.5.98.46
                PO AAN2102002-V020.docGet hashmaliciousBrowse
                • 194.5.98.182
                DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909_RAW.docGet hashmaliciousBrowse
                • 194.5.98.202
                neue bestellung.PDF.exeGet hashmaliciousBrowse
                • 194.5.97.48
                Orderoffer.exeGet hashmaliciousBrowse
                • 194.5.98.66
                neue bestellung.PDF.exeGet hashmaliciousBrowse
                • 194.5.97.48
                OrderSuppliesQuote0817916.exeGet hashmaliciousBrowse
                • 194.5.97.248
                DHL_6368638172 documento de recibo,pdf.exeGet hashmaliciousBrowse
                • 194.5.97.244
                QuotationInvoices.exeGet hashmaliciousBrowse
                • 194.5.97.248
                PAYMENT_.EXEGet hashmaliciousBrowse
                • 194.5.98.211
                payment.exeGet hashmaliciousBrowse
                • 194.5.98.66
                RFQ_1101983736366355 1101938377388.exeGet hashmaliciousBrowse
                • 194.5.98.21
                Slip copy .xls.exeGet hashmaliciousBrowse
                • 194.5.97.116
                Scan0059.pdf.exeGet hashmaliciousBrowse
                • 194.5.97.34
                DHL AWB # 6008824216.png.exeGet hashmaliciousBrowse
                • 194.5.97.48
                Scan0019.exeGet hashmaliciousBrowse
                • 194.5.97.34
                PurchaseOrdersCSTtyres004786587.exeGet hashmaliciousBrowse
                • 194.5.97.248
                Invoice467972.jarGet hashmaliciousBrowse
                • 194.5.97.18
                Invoice467972.jarGet hashmaliciousBrowse
                • 194.5.97.18
                Hk6Im7DPON.exeGet hashmaliciousBrowse
                • 194.5.98.107

                JA3 Fingerprints

                No context

                Dropped Files

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSecuriteInfo.com.Variant.Razy.845229.13077.exeGet hashmaliciousBrowse
                  document.exeGet hashmaliciousBrowse
                    w0JlVAbpIT.exeGet hashmaliciousBrowse
                      Bjdl7RO0K8.exeGet hashmaliciousBrowse
                        4hW0TZqN01.exeGet hashmaliciousBrowse
                          d4e475d7d17a16be8b9eeac6e10b25af.exeGet hashmaliciousBrowse
                            e5bd3238d220c97cd4d6969abb3b33e0.exeGet hashmaliciousBrowse
                              1c2dec9cbfcd95afe13bf71910fdf95f.exeGet hashmaliciousBrowse
                                Xf6v0G2wIM.exeGet hashmaliciousBrowse
                                  jztWD1iKrC.exeGet hashmaliciousBrowse
                                    wH22vdkhhU.exeGet hashmaliciousBrowse
                                      AqpOn6nwXS.exeGet hashmaliciousBrowse
                                        CklrD7MYX2.exeGet hashmaliciousBrowse
                                          FahZG6Pdc4.exeGet hashmaliciousBrowse
                                            61WlCsQR9Q.exeGet hashmaliciousBrowse
                                              U7DiqWP9qu.exeGet hashmaliciousBrowse
                                                d4x5rI09A7.exeGet hashmaliciousBrowse
                                                  1WW425NrsA.exeGet hashmaliciousBrowse
                                                    Kyd6mztyQ5.exeGet hashmaliciousBrowse
                                                      xdNg7FUNS2.exeGet hashmaliciousBrowse

                                                        Created / dropped Files

                                                        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):53248
                                                        Entropy (8bit):4.490095782293901
                                                        Encrypted:false
                                                        SSDEEP:768:0P2Bbv+VazyoD2z9TU//1mz1+M9GnLEu+2wTFRJS8Ulg:HJv46yoD2BTNz1+M9GLfOw8UO
                                                        MD5:529695608EAFBED00ACA9E61EF333A7C
                                                        SHA1:68CA8B6D8E74FA4F4EE603EB862E36F2A73BC1E5
                                                        SHA-256:44F129DE312409D8A2DF55F655695E1D48D0DB6F20C5C7803EB0032D8E6B53D0
                                                        SHA-512:8FE476E0185B2B0C66F34E51899B932CB35600C753D36FE102BDA5894CDAA58410044E0A30FDBEF76A285C2C75018D7C5A9BA0763D45EC605C2BBD1EBB9ED674
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        • Antivirus: Metadefender, Detection: 0%, Browse
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Joe Sandbox View:
                                                        • Filename: SecuriteInfo.com.Variant.Razy.845229.13077.exe, Detection: malicious, Browse
                                                        • Filename: document.exe, Detection: malicious, Browse
                                                        • Filename: w0JlVAbpIT.exe, Detection: malicious, Browse
                                                        • Filename: Bjdl7RO0K8.exe, Detection: malicious, Browse
                                                        • Filename: 4hW0TZqN01.exe, Detection: malicious, Browse
                                                        • Filename: d4e475d7d17a16be8b9eeac6e10b25af.exe, Detection: malicious, Browse
                                                        • Filename: e5bd3238d220c97cd4d6969abb3b33e0.exe, Detection: malicious, Browse
                                                        • Filename: 1c2dec9cbfcd95afe13bf71910fdf95f.exe, Detection: malicious, Browse
                                                        • Filename: Xf6v0G2wIM.exe, Detection: malicious, Browse
                                                        • Filename: jztWD1iKrC.exe, Detection: malicious, Browse
                                                        • Filename: wH22vdkhhU.exe, Detection: malicious, Browse
                                                        • Filename: AqpOn6nwXS.exe, Detection: malicious, Browse
                                                        • Filename: CklrD7MYX2.exe, Detection: malicious, Browse
                                                        • Filename: FahZG6Pdc4.exe, Detection: malicious, Browse
                                                        • Filename: 61WlCsQR9Q.exe, Detection: malicious, Browse
                                                        • Filename: U7DiqWP9qu.exe, Detection: malicious, Browse
                                                        • Filename: d4x5rI09A7.exe, Detection: malicious, Browse
                                                        • Filename: 1WW425NrsA.exe, Detection: malicious, Browse
                                                        • Filename: Kyd6mztyQ5.exe, Detection: malicious, Browse
                                                        • Filename: xdNg7FUNS2.exe, Detection: malicious, Browse
                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{Z..................... .......... ........@.. ..............................N.....@.....................................O................................... ................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\RegAsm.exe.log
                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:modified
                                                        Size (bytes):20
                                                        Entropy (8bit):3.6841837197791887
                                                        Encrypted:false
                                                        SSDEEP:3:QHXMKas:Q3Las
                                                        MD5:B3AC9D09E3A47D5FD00C37E075A70ECB
                                                        SHA1:AD14E6D0E07B00BD10D77A06D68841B20675680B
                                                        SHA-256:7A23C6E7CCD8811ECDF038D3A89D5C7D68ED37324BAE2D4954125D9128FA9432
                                                        SHA-512:09B609EE1061205AA45B3C954EFC6C1A03C8FD6B3011FF88CF2C060E19B1D7FD51EE0CB9D02A39310125F3A66AA0146261BDEE3D804F472034DF711BC942E316
                                                        Malicious:true
                                                        Preview: 1,"fusion","GAC",0..
                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                        Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:modified
                                                        Size (bytes):20
                                                        Entropy (8bit):3.6841837197791887
                                                        Encrypted:false
                                                        SSDEEP:3:QHXMKas:Q3Las
                                                        MD5:B3AC9D09E3A47D5FD00C37E075A70ECB
                                                        SHA1:AD14E6D0E07B00BD10D77A06D68841B20675680B
                                                        SHA-256:7A23C6E7CCD8811ECDF038D3A89D5C7D68ED37324BAE2D4954125D9128FA9432
                                                        SHA-512:09B609EE1061205AA45B3C954EFC6C1A03C8FD6B3011FF88CF2C060E19B1D7FD51EE0CB9D02A39310125F3A66AA0146261BDEE3D804F472034DF711BC942E316
                                                        Malicious:false
                                                        Preview: 1,"fusion","GAC",0..
                                                        C:\Users\user\AppData\Local\Temp\tmpE4CC.tmp
                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1319
                                                        Entropy (8bit):5.133606110275315
                                                        Encrypted:false
                                                        SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mne5xtn:cbk4oL600QydbQxIYODOLedq3Ze5j
                                                        MD5:C6F0625BF4C1CDFB699980C9243D3B22
                                                        SHA1:43DE1FE580576935516327F17B5DA0C656C72851
                                                        SHA-256:8DFC4E937F0B2374E3CED25FCE344B0731CF44B8854625B318D50ECE2DA8F576
                                                        SHA-512:9EF2DBD4142AD0E1E6006929376ECB8011E7FFC801EE2101E906787D70325AD82752DF65839DE9972391FA52E1E5974EC1A5C7465A88AA56257633EBB7D70969
                                                        Malicious:true
                                                        Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                        C:\Users\user\AppData\Local\Temp\tmpE7FA.tmp
                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1310
                                                        Entropy (8bit):5.109425792877704
                                                        Encrypted:false
                                                        SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                        MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                        SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                        SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                        SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                        Malicious:false
                                                        Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                        File Type:COM executable for DOS
                                                        Category:dropped
                                                        Size (bytes):8
                                                        Entropy (8bit):2.75
                                                        Encrypted:false
                                                        SSDEEP:3:EF:EF
                                                        MD5:6E49A312690E315F4BC2BA43AF4030EC
                                                        SHA1:9A9D72CD8DEE34F0255903E39783F6B8FAB4D319
                                                        SHA-256:5F595A3E8DD84AE806A7D2D31169D6C698FFB74CE24CCC14B2549030E1D6BAC3
                                                        SHA-512:AD53023FF9C31AF49E313DCE09A7E7338EAAE29DFF44A7B963F82FAA7DC679393DE3AD1C079C343EED743E33DB3B7BD00F98004542336F8C02F71554DDD6A2F5
                                                        Malicious:true
                                                        Preview: ...^...H
                                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):56
                                                        Entropy (8bit):4.787365359936823
                                                        Encrypted:false
                                                        SSDEEP:3:oMty8WbSXgL4A:oMLWuQL4A
                                                        MD5:EFD1636CFC3CC38FD7BABAE5CAC9EDE0
                                                        SHA1:4D7D378ABEB682EEFBD039930C0EA996FBF54178
                                                        SHA-256:F827D5B11C1EB3902D601C3E0B59BA32FE11C0B573FBF22FB2AF86BFD4651BBA
                                                        SHA-512:69B2B0AB1A6E13395EF52DCB903B8E17D842E6D0D44F801FF2659CFD5EC343C8CC57928B02961FC7099AD43FF05633BAF5AC39042A00C8676D4FA8F6F8C2A5D7
                                                        Malicious:false
                                                        Preview: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                        C:\Users\user\subfolder1\filename1.exe
                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):131072
                                                        Entropy (8bit):4.85840802848053
                                                        Encrypted:false
                                                        SSDEEP:3072:FwVUPYLV4+aQTxxs+7Qx+2OGeoyrARHNlyCI2jnyIa3MAB+f/FwGIt1KFzOn1k4H:FwVUPYLV4+aQTxxs+7Qx+2OGeoyrARHs
                                                        MD5:ACFCBD916FA04787E4388B339592DD78
                                                        SHA1:F2A572347C81B71C3A59F00A37F68DB698715460
                                                        SHA-256:EDE5C7B0267F4801A7BEBB22A18035923E71A476CEB3B9D94F582AA199DEB3F0
                                                        SHA-512:23B895AD239AC48726A1446299E4534E496BB891530CB11E3764FB871F5F5097B12CCE346FDBCFE4A1C31D46F31A25CE407B17D6AB1A141BEEF9613E92DA817E
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 7%
                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.....0...~..0......0...Rich1...........PE..L....$T.................P...................`....@.........................................................................TY..(....p.....................................................................(... ....................................text....M.......P.................. ..`.data........`.......`..............@....rsrc.......p.......p..............@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        \Device\ConDrv
                                                        Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1010
                                                        Entropy (8bit):4.298581893109255
                                                        Encrypted:false
                                                        SSDEEP:24:zKTDwL/0XZd3Wo3opQ5ZKBQFYVgt7ovrNOYlK:zKTDwAXZxo4ABV+SrUYE
                                                        MD5:367EEEC425FE7E80B723298C447E2F22
                                                        SHA1:3873DFC88AF504FF79231FE2BF0E3CD93CE45195
                                                        SHA-256:481A7A3CA0DD32DA4772718BA4C1EF3F01E8D184FE82CF6E9C5386FD343264BC
                                                        SHA-512:F7101541D87F045E9DBC45941CDC5A7F97F3EFC29AC0AF2710FC24FA64F0163F9463DE373A5D2BE1270126829DE81006FB8E764186374966E8D0E9BB35B7D7D6
                                                        Malicious:false
                                                        Preview: Microsoft (R) .NET Framework Assembly Registration Utility 2.0.50727.8922..Copyright (C) Microsoft Corporation 1998-2004. All rights reserved.....Syntax: RegAsm AssemblyName [Options]..Options:.. /unregister Unregister types.. /tlb[:FileName] Export the assembly to the specified type library.. and register it.. /regfile[:FileName] Generate a reg file with the specified name.. instead of registering the types. This option.. cannot be used with the /u or /tlb options.. /codebase Set the code base in the registry.. /registered Only refer to already registered type libraries.. /asmpath:Directory Look for assembly references here.. /nologo Prevents RegAsm from displaying logo.. /silent Silent mode. Prevents displaying of success messages.. /verbose Displays extra information.. /? or /help Display this usage

                                                        Static File Info

                                                        General

                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):4.85840802848053
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.15%
                                                        • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:3Fv4j323nj.exe
                                                        File size:131072
                                                        MD5:acfcbd916fa04787e4388b339592dd78
                                                        SHA1:f2a572347c81b71c3a59f00a37f68db698715460
                                                        SHA256:ede5c7b0267f4801a7bebb22a18035923e71a476ceb3b9d94f582aa199deb3f0
                                                        SHA512:23b895ad239ac48726a1446299e4534e496bb891530cb11e3764fb871f5f5097b12cce346fdbcfe4a1c31d46f31a25ce407b17d6ab1a141beef9613e92da817e
                                                        SSDEEP:3072:FwVUPYLV4+aQTxxs+7Qx+2OGeoyrARHNlyCI2jnyIa3MAB+f/FwGIt1KFzOn1k4H:FwVUPYLV4+aQTxxs+7Qx+2OGeoyrARHs
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.......0...~...0.......0...Rich1...........PE..L.....$T.................P...................`....@................

                                                        File Icon

                                                        Icon Hash:01d292796dda0080

                                                        Static PE Info

                                                        General

                                                        Entrypoint:0x4013dc
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                        DLL Characteristics:
                                                        Time Stamp:0x5424AED4 [Fri Sep 26 00:09:56 2014 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:cc882d101998a701353b40b0cd8c341a

                                                        Entrypoint Preview

                                                        Instruction
                                                        push 00412774h
                                                        call 00007F4684C461D3h
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        xor byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        inc eax
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax-61h], dl
                                                        sub dword ptr [edx+ebx*8], ebx
                                                        or al, 66h
                                                        dec esi
                                                        mov eax, 1FB77221h
                                                        sbb cl, byte ptr [ecx+2Eh]
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add dword ptr [eax], eax
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        dec ebp
                                                        inc ecx
                                                        inc edi
                                                        dec ecx
                                                        push ebx
                                                        push esp
                                                        inc ebp
                                                        push edx
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        jecxz 00007F4684C461EFh
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        dec esp
                                                        xor dword ptr [eax], eax
                                                        add al, C9h
                                                        pop ecx
                                                        and ch, cl
                                                        hlt
                                                        pushad
                                                        out 43h, al
                                                        mov ch, 90h
                                                        fdiv qword ptr [edi-37F9A4A3h]
                                                        inc ebx
                                                        imul ebx, dword ptr [ebx+eax*4+04h], B74A52B6h
                                                        adc dh, byte ptr [ebx-52h]
                                                        mov dh, A6h
                                                        mov byte ptr [eax+33AD4F3Ah], FFFFFF99h
                                                        iretw
                                                        adc dword ptr [edi+00AA000Ch], esi
                                                        pushad
                                                        rcl dword ptr [ebx+00000000h], cl
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        xchg eax, ebp
                                                        adc al, byte ptr [ecx]
                                                        add byte ptr [esi+0000007Fh], dl
                                                        pop es
                                                        add byte ptr [ecx+67h], cl
                                                        outsb
                                                        aaa
                                                        add byte ptr [66000801h], cl
                                                        insb
                                                        insb
                                                        popad
                                                        bound ebp, dword ptr [ebp+00h]

                                                        Data Directories

                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x159540x28.text
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x170000x83d6.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x10000xe0.text
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                        Sections

                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x14d840x15000False0.395542689732data5.53569539518IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                        .data0x160000xa180x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                        .rsrc0x170000x83d60x9000False0.340196397569data3.52970620397IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                        Resources

                                                        NameRVASizeTypeLanguageCountry
                                                        RT_ICON0x1f2ae0x128GLS_BINARY_LSB_FIRST
                                                        RT_ICON0x1dc860x1628dBase IV DBT of \200.DBF, blocks size 0, block length 4608, next free block index 40, next free block 0, next used block 0
                                                        RT_ICON0x1bfde0x1ca8data
                                                        RT_ICON0x1b3360xca8data
                                                        RT_ICON0x1afce0x368GLS_BINARY_LSB_FIRST
                                                        RT_ICON0x18a260x25a8data
                                                        RT_ICON0x1797e0x10a8data
                                                        RT_ICON0x175160x468GLS_BINARY_LSB_FIRST
                                                        RT_GROUP_ICON0x174a00x76data
                                                        RT_VERSION0x172400x260data

                                                        Imports

                                                        DLLImport
                                                        MSVBVM60.DLL_CIcos, _adj_fptan, __vbaFreeVar, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaLateMemCall, __vbaVarDup, _CIatan, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

                                                        Version Infos

                                                        DescriptionData
                                                        Translation0x0000 0x04b0
                                                        InternalNametrenchlet
                                                        FileVersion1.00
                                                        CompanyNameSinth Radio
                                                        ProductNameSinth Radio
                                                        ProductVersion1.00
                                                        FileDescriptionSinth Radio
                                                        OriginalFilenametrenchlet.exe

                                                        Network Behavior

                                                        Network Port Distribution

                                                        TCP Packets

                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Feb 24, 2021 09:19:41.300220966 CET497433765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:19:41.379900932 CET376549743194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:19:41.881926060 CET497433765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:19:41.961496115 CET376549743194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:19:42.475744963 CET497433765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:19:42.558160067 CET376549743194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:19:46.663628101 CET497443765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:19:46.731425047 CET376549744194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:19:47.241864920 CET497443765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:19:47.310600996 CET376549744194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:19:47.851201057 CET497443765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:19:47.918890953 CET376549744194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:19:51.932102919 CET497453765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:19:51.999983072 CET376549745194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:19:52.554655075 CET497453765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:19:52.624054909 CET376549745194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:19:53.242300034 CET497453765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:19:53.311188936 CET376549745194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:19:57.352601051 CET497463765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:19:57.420849085 CET376549746194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:19:58.055802107 CET497463765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:19:58.123481989 CET376549746194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:19:58.742737055 CET497463765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:19:58.810707092 CET376549746194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:02.888335943 CET497503765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:02.957760096 CET376549750194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:03.556118011 CET497503765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:03.623994112 CET376549750194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:04.244697094 CET497503765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:04.312689066 CET376549750194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:08.332813025 CET497513765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:08.412843943 CET376549751194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:09.056123972 CET497513765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:09.135972977 CET376549751194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:09.743658066 CET497513765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:09.825552940 CET376549751194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:13.889895916 CET497523765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:13.957961082 CET376549752194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:14.556612968 CET497523765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:14.624669075 CET376549752194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:15.244081974 CET497523765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:15.312050104 CET376549752194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:19.327959061 CET497533765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:19.397562027 CET376549753194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:20.057024956 CET497533765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:20.127264977 CET376549753194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:20.744601965 CET497533765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:20.812661886 CET376549753194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:24.866000891 CET497543765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:24.945856094 CET376549754194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:25.557502031 CET497543765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:25.637367010 CET376549754194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:26.151344061 CET497543765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:26.231223106 CET376549754194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:30.285603046 CET497553765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:30.353274107 CET376549755194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:30.854815960 CET497553765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:30.923059940 CET376549755194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:31.558011055 CET497553765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:31.626044989 CET376549755194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:35.653356075 CET497563765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:35.721105099 CET376549756194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:36.245901108 CET497563765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:36.315162897 CET376549756194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:36.855320930 CET497563765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:36.923559904 CET376549756194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:40.971987009 CET497573765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:41.051913023 CET376549757194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:41.558893919 CET497573765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:41.639123917 CET376549757194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:42.246387005 CET497573765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:42.326005936 CET376549757194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:46.366910934 CET497583765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:46.446589947 CET376549758194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:47.052978039 CET497583765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:47.133605003 CET376549758194.5.98.182192.168.2.3
                                                        Feb 24, 2021 09:20:47.746603966 CET497583765192.168.2.3194.5.98.182
                                                        Feb 24, 2021 09:20:47.827811956 CET376549758194.5.98.182192.168.2.3

                                                        UDP Packets

                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Feb 24, 2021 09:17:48.956769943 CET5128153192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:17:48.980241060 CET4919953192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:17:49.011619091 CET53512818.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:17:49.034463882 CET53491998.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:17:49.705398083 CET5062053192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:17:49.766128063 CET53506208.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:17:50.123684883 CET6493853192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:17:50.175513029 CET53649388.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:17:51.459873915 CET6015253192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:17:51.511327028 CET53601528.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:17:51.698739052 CET5754453192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:17:51.757580042 CET53575448.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:17:52.751905918 CET5598453192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:17:52.803951979 CET53559848.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:17:54.673037052 CET6418553192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:17:54.724788904 CET53641858.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:17:56.019535065 CET6511053192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:17:56.073129892 CET53651108.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:17:57.311530113 CET5836153192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:17:57.360574961 CET53583618.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:17:59.473475933 CET6349253192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:17:59.523004055 CET53634928.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:18:00.629548073 CET6083153192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:18:00.681612015 CET53608318.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:18:22.192106009 CET6010053192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:18:22.251553059 CET53601008.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:18:36.506161928 CET5319553192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:18:36.555207014 CET53531958.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:18:37.859616995 CET5014153192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:18:37.908946037 CET53501418.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:18:38.950968981 CET5302353192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:18:39.000190973 CET53530238.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:18:40.336797953 CET4956353192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:18:40.388636112 CET53495638.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:18:42.263293982 CET5135253192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:18:42.326663017 CET53513528.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:18:43.296252966 CET5934953192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:18:43.347326040 CET53593498.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:19:03.862909079 CET5708453192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:19:03.911844015 CET53570848.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:19:07.624607086 CET5882353192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:19:07.687391043 CET53588238.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:19:13.906763077 CET5756853192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:19:13.955673933 CET53575688.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:19:15.050631046 CET5054053192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:19:15.109963894 CET53505408.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:19:16.576379061 CET5436653192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:19:16.625118971 CET53543668.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:19:17.980823040 CET5303453192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:19:18.052654028 CET53530348.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:19:36.900980949 CET5776253192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:19:36.952677965 CET53577628.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:19:37.573504925 CET5543553192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:19:37.661463976 CET53554358.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:19:39.585629940 CET5071353192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:19:39.637490988 CET53507138.8.8.8192.168.2.3
                                                        Feb 24, 2021 09:19:57.256592989 CET5613253192.168.2.38.8.8.8
                                                        Feb 24, 2021 09:19:57.318309069 CET53561328.8.8.8192.168.2.3

                                                        DNS Queries

                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                        Feb 24, 2021 09:19:36.900980949 CET192.168.2.38.8.8.80xa4b6Standard query (0)onedrive.live.comA (IP address)IN (0x0001)
                                                        Feb 24, 2021 09:19:37.573504925 CET192.168.2.38.8.8.80xbee7Standard query (0)cbavwq.bl.files.1drv.comA (IP address)IN (0x0001)

                                                        DNS Answers

                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                        Feb 24, 2021 09:19:36.952677965 CET8.8.8.8192.168.2.30xa4b6No error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                                        Feb 24, 2021 09:19:37.661463976 CET8.8.8.8192.168.2.30xbee7No error (0)cbavwq.bl.files.1drv.combl-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                                                        Feb 24, 2021 09:19:37.661463976 CET8.8.8.8192.168.2.30xbee7No error (0)bl-files.fe.1drv.comodc-bl-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)

                                                        Code Manipulations

                                                        Statistics

                                                        Behavior

                                                        Click to jump to process

                                                        System Behavior

                                                        General

                                                        Start time:09:17:58
                                                        Start date:24/02/2021
                                                        Path:C:\Users\user\Desktop\3Fv4j323nj.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'C:\Users\user\Desktop\3Fv4j323nj.exe'
                                                        Imagebase:0x400000
                                                        File size:131072 bytes
                                                        MD5 hash:ACFCBD916FA04787E4388B339592DD78
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:Visual Basic
                                                        Reputation:low

                                                        General

                                                        Start time:09:19:21
                                                        Start date:24/02/2021
                                                        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'C:\Users\user\Desktop\3Fv4j323nj.exe'
                                                        Imagebase:0xc30000
                                                        File size:53248 bytes
                                                        MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET
                                                        Yara matches:
                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.503235354.0000000020790000.00000004.00000001.sdmp, Author: Florian Roth
                                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.503235354.0000000020790000.00000004.00000001.sdmp, Author: Florian Roth
                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.503235354.0000000020790000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.501121759.000000001ED77000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.501121759.000000001ED77000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                        • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 0000000C.00000002.482199109.0000000001002000.00000040.00000001.sdmp, Author: Joe Security
                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.502878730.0000000020500000.00000004.00000001.sdmp, Author: Florian Roth
                                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.502878730.0000000020500000.00000004.00000001.sdmp, Author: Florian Roth
                                                        Reputation:high

                                                        General

                                                        Start time:09:19:22
                                                        Start date:24/02/2021
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6b2800000
                                                        File size:625664 bytes
                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        General

                                                        Start time:09:19:39
                                                        Start date:24/02/2021
                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE4CC.tmp'
                                                        Imagebase:0x1b0000
                                                        File size:185856 bytes
                                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        General

                                                        Start time:09:19:40
                                                        Start date:24/02/2021
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6b2800000
                                                        File size:625664 bytes
                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        General

                                                        Start time:09:19:40
                                                        Start date:24/02/2021
                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE7FA.tmp'
                                                        Imagebase:0x1b0000
                                                        File size:185856 bytes
                                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        General

                                                        Start time:09:19:40
                                                        Start date:24/02/2021
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6b2800000
                                                        File size:625664 bytes
                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        General

                                                        Start time:09:19:41
                                                        Start date:24/02/2021
                                                        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 0
                                                        Imagebase:0x80000
                                                        File size:53248 bytes
                                                        MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET
                                                        Reputation:high

                                                        General

                                                        Start time:09:19:41
                                                        Start date:24/02/2021
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6b2800000
                                                        File size:625664 bytes
                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        General

                                                        Start time:09:19:41
                                                        Start date:24/02/2021
                                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                        Imagebase:0x6c0000
                                                        File size:53248 bytes
                                                        MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET
                                                        Antivirus matches:
                                                        • Detection: 0%, Virustotal, Browse
                                                        • Detection: 0%, Metadefender, Browse
                                                        • Detection: 0%, ReversingLabs
                                                        Reputation:high

                                                        General

                                                        Start time:09:19:41
                                                        Start date:24/02/2021
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6b2800000
                                                        File size:625664 bytes
                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        General

                                                        Start time:09:19:47
                                                        Start date:24/02/2021
                                                        Path:C:\Users\user\subfolder1\filename1.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'C:\Users\user\subfolder1\filename1.exe'
                                                        Imagebase:0x400000
                                                        File size:131072 bytes
                                                        MD5 hash:ACFCBD916FA04787E4388B339592DD78
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:Visual Basic
                                                        Antivirus matches:
                                                        • Detection: 7%, ReversingLabs
                                                        Reputation:low

                                                        General

                                                        Start time:09:19:55
                                                        Start date:24/02/2021
                                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                        Imagebase:0x10000
                                                        File size:53248 bytes
                                                        MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET

                                                        General

                                                        Start time:09:19:55
                                                        Start date:24/02/2021
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6b2800000
                                                        File size:625664 bytes
                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language

                                                        Disassembly

                                                        Code Analysis

                                                        Reset < >