Loading ...

Play interactive tourEdit tour

Analysis Report V33QokMrIv.exe

Overview

General Information

Sample Name:V33QokMrIv.exe
Analysis ID:357184
MD5:e18dbe57194dd717d54a907ba8e6d3e1
SHA1:76bacc8c5fbbf675399c39c42565dfc3d77be98b
SHA256:b5d510179ab07f09c10cfa2ea9d95346fb696afd3f642af2882b3f4cd16d3ff5
Tags:exeGuLoader
Infos:

Most interesting Screenshot:

Detection

Nanocore GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected GuLoader
Yara detected Nanocore RAT
C2 URLs / IPs found in malware configuration
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • V33QokMrIv.exe (PID: 6352 cmdline: 'C:\Users\user\Desktop\V33QokMrIv.exe' MD5: E18DBE57194DD717D54A907BA8E6D3E1)
    • taskhostw.exe (PID: 6556 cmdline: taskhostw.exe None MD5: CE95E236FC9FE2D6F16C926C75B18BAF)
      • conhost.exe (PID: 5664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5496 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7CFF.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5516 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp801C.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegAsm.exe (PID: 6556 cmdline: 'C:\Users\user\Desktop\V33QokMrIv.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
  • RegAsm.exe (PID: 768 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 0 MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • conhost.exe (PID: 6012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 2936 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • conhost.exe (PID: 4244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • filename1.exe (PID: 6092 cmdline: 'C:\Users\user\subfolder1\filename1.exe' MD5: E18DBE57194DD717D54A907BA8E6D3E1)
  • dhcpmon.exe (PID: 6896 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • conhost.exe (PID: 6864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • filename1.exe (PID: 6980 cmdline: 'C:\Users\user\subfolder1\filename1.exe' MD5: E18DBE57194DD717D54A907BA8E6D3E1)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "92421eeb-c456-44c2-ab8d-5a66d7e5ab97", "Group": "Company", "Domain1": "194.5.98.202", "Domain2": "", "Port": 4488, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000F.00000002.1253583807.000000001EDB3000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000F.00000002.1187103126.0000000001002000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
      Process Memory Space: RegAsm.exe PID: 6556JoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Process Memory Space: RegAsm.exe PID: 6556JoeSecurity_GuLoaderYara detected GuLoaderJoe Security
          Process Memory Space: RegAsm.exe PID: 6556NanoCoreunknown Kevin Breen <kevin@techanarchy.net>
          • 0x92f9:$a: NanoCore
          • 0x9326:$a: NanoCore
          • 0x937f:$a: NanoCore
          • 0x10b8e:$a: NanoCore
          • 0x10ba1:$a: NanoCore
          • 0x10bd3:$a: NanoCore
          • 0x1a664:$a: NanoCore
          • 0x1a691:$a: NanoCore
          • 0x1a6ea:$a: NanoCore
          • 0x21ef9:$a: NanoCore
          • 0x21f0c:$a: NanoCore
          • 0x21f3e:$a: NanoCore
          • 0x959c8:$a: NanoCore
          • 0x95bf2:$a: NanoCore
          • 0xcbe10:$a: NanoCore
          • 0x147046:$a: NanoCore
          • 0x147270:$a: NanoCore
          • 0x17720b:$a: NanoCore
          • 0x1772ac:$a: NanoCore
          • 0x177319:$a: NanoCore
          • 0x1773da:$a: NanoCore

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          15.2.RegAsm.exe.1dd712f8.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xe75:$x1: NanoCore.ClientPluginHost
          • 0xe8f:$x2: IClientNetworkHost
          15.2.RegAsm.exe.1dd712f8.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0xe75:$x2: NanoCore.ClientPluginHost
          • 0x1261:$s3: PipeExists
          • 0x1136:$s4: PipeCreated
          • 0xeb0:$s5: IClientLoggingHost
          15.2.RegAsm.exe.1edc7a58.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xf7ad:$x1: NanoCore.ClientPluginHost
          • 0xf7da:$x2: IClientNetworkHost
          15.2.RegAsm.exe.1edc7a58.4.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0xf7ad:$x2: NanoCore.ClientPluginHost
          • 0x10888:$s4: PipeCreated
          • 0xf7c7:$s5: IClientLoggingHost
          15.2.RegAsm.exe.1edc7a58.4.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
            Click to see the 6 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, ProcessId: 6556, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
            Sigma detected: Scheduled temp file as task from temp locationShow sources
            Source: Process startedAuthor: Joe Security: Data: Command: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7CFF.tmp', CommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7CFF.tmp', CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: taskhostw.exe None, ParentImage: C:\Windows\System32\taskhostw.exe, ParentProcessId: 6556, ProcessCommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7CFF.tmp', ProcessId: 5496

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 0000000F.00000002.1253583807.000000001EDB3000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "92421eeb-c456-44c2-ab8d-5a66d7e5ab97", "Group": "Company", "Domain1": "194.5.98.202", "Domain2": "", "Port": 4488, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 0000000F.00000002.1253583807.000000001EDB3000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6556, type: MEMORY
            Source: Yara matchFile source: 15.2.RegAsm.exe.1edc7a58.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.RegAsm.exe.1edc7a58.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.RegAsm.exe.1edcc081.3.raw.unpack, type: UNPACKEDPE

            Compliance:

            barindex
            Uses 32bit PE filesShow sources
            Source: V33QokMrIv.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Uses new MSVCR DllsShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Binary contains paths to debug symbolsShow sources
            Source: Binary string: \??\C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdbxe2b source: RegAsm.exe, 0000000F.00000003.1174003449.0000000001554000.00000004.00000001.sdmp
            Source: Binary string: C:\Windows\symbols\exe\RegAsm.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: \??\C:\Windows\dll\System.pdb source: RegAsm.exe, 0000000F.00000003.1174003449.0000000001554000.00000004.00000001.sdmp
            Source: Binary string: C:\Windows\dll\System.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: RegAsm.pdb source: dhcpmon.exe, dhcpmon.exe.15.dr
            Source: Binary string: indows\RegAsm.pdbpdbAsm.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: \??\C:\Windows\System.pdb source: RegAsm.exe, 0000000F.00000003.1173973223.000000000150D000.00000004.00000001.sdmp
            Source: Binary string: indows\System.pdbpdbtem.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\symbols\dll\System.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: System.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\System.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49766 -> 194.5.98.202:4488
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49767 -> 194.5.98.202:4488
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49768 -> 194.5.98.202:4488
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49769 -> 194.5.98.202:4488
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs:
            Source: Malware configuration extractorURLs: 194.5.98.202
            Source: global trafficTCP traffic: 192.168.2.4:49766 -> 194.5.98.202:4488
            Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
            Source: unknownDNS traffic detected: queries for: onedrive.live.com
            Source: RegAsm.exe, 0000000F.00000003.1173973223.000000000150D000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
            Source: RegAsm.exe, 0000000F.00000003.1173973223.000000000150D000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
            Source: RegAsm.exe, 0000000F.00000003.1173973223.000000000150D000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.msocsp.com0
            Source: RegAsm.exe, 0000000F.00000002.1191880037.00000000014AB000.00000004.00000020.sdmpString found in binary or memory: https://ibkebw.dm.files.1drv.com/
            Source: RegAsm.exe, 0000000F.00000002.1191880037.00000000014AB000.00000004.00000020.sdmpString found in binary or memory: https://ibkebw.dm.files.1drv.com/Jep
            Source: RegAsm.exe, 0000000F.00000003.1173973223.000000000150D000.00000004.00000001.sdmp, RegAsm.exe, 0000000F.00000002.1191919663.00000000014FB000.00000004.00000020.sdmpString found in binary or memory: https://ibkebw.dm.files.1drv.com/y4m_7vjlVAP2dktIZ7ToWB_X8Tx5mpxc0CHqB4Dc4Xc8QJNrWia8ZAB0h8vRJGCEryL
            Source: RegAsm.exe, 0000000F.00000002.1191880037.00000000014AB000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/
            Source: RegAsm.exe, RegAsm.exe, 0000000F.00000002.1191880037.00000000014AB000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/download?cid=802AC8A73EEC8C8E&resid=802AC8A73EEC8C8E%21110&authkey=AK1w6-P
            Source: RegAsm.exe, 0000000F.00000002.1191880037.00000000014AB000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/zZm
            Source: RegAsm.exe, 0000000F.00000002.1253583807.000000001EDB3000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

            E-Banking Fraud:

            barindex
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 0000000F.00000002.1253583807.000000001EDB3000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6556, type: MEMORY
            Source: Yara matchFile source: 15.2.RegAsm.exe.1edc7a58.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.RegAsm.exe.1edc7a58.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.RegAsm.exe.1edcc081.3.raw.unpack, type: UNPACKEDPE

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: Process Memory Space: RegAsm.exe PID: 6556, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 15.2.RegAsm.exe.1dd712f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 15.2.RegAsm.exe.1edc7a58.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 15.2.RegAsm.exe.1edc7a58.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 15.2.RegAsm.exe.1edcc081.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: C:\Users\user\Desktop\V33QokMrIv.exeProcess Stats: CPU usage > 98%
            Source: C:\Users\user\subfolder1\filename1.exeProcess Stats: CPU usage > 98%
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_0100723F NtProtectVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_049101B7
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_050101B7
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_049A01C8
            Source: V33QokMrIv.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: V33QokMrIv.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: V33QokMrIv.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: filename1.exe.15.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: filename1.exe.15.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: filename1.exe.15.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: V33QokMrIv.exe, 00000000.00000000.646684744.0000000000417000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameKARAKTERISTIKONS.exe vs V33QokMrIv.exe
            Source: V33QokMrIv.exeBinary or memory string: OriginalFilenameKARAKTERISTIKONS.exe vs V33QokMrIv.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
            Source: V33QokMrIv.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: Process Memory Space: RegAsm.exe PID: 6556, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 15.2.RegAsm.exe.1dd712f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 15.2.RegAsm.exe.1dd712f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 15.2.RegAsm.exe.1edc7a58.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 15.2.RegAsm.exe.1edc7a58.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 15.2.RegAsm.exe.1edc7a58.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 15.2.RegAsm.exe.1edc7a58.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 15.2.RegAsm.exe.1edcc081.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 15.2.RegAsm.exe.1edcc081.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: classification engineClassification label: mal100.troj.evad.winEXE@19/12@2/1
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Users\user\subfolder1Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6012:120:WilError_01
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5664:120:WilError_01
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5500:120:WilError_01
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6520:120:WilError_01
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4244:120:WilError_01
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{92421eeb-c456-44c2-ab8d-5a66d7e5ab97}
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6864:120:WilError_01
            Source: C:\Users\user\Desktop\V33QokMrIv.exeFile created: C:\Users\user\AppData\Local\Temp\~DF65C51E8A0EADE8B5.TMPJump to behavior
            Source: V33QokMrIv.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\V33QokMrIv.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\subfolder1\filename1.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\subfolder1\filename1.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Users\user\Desktop\V33QokMrIv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\V33QokMrIv.exe 'C:\Users\user\Desktop\V33QokMrIv.exe'
            Source: unknownProcess created: C:\Windows\System32\taskhostw.exe taskhostw.exe None
            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\V33QokMrIv.exe'
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7CFF.tmp'
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp801C.tmp'
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 0
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\subfolder1\filename1.exe 'C:\Users\user\subfolder1\filename1.exe'
            Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\subfolder1\filename1.exe 'C:\Users\user\subfolder1\filename1.exe'
            Source: C:\Users\user\Desktop\V33QokMrIv.exeProcess created: C:\Windows\System32\taskhostw.exe taskhostw.exe None
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7CFF.tmp'
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp801C.tmp'
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: Binary string: \??\C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdbxe2b source: RegAsm.exe, 0000000F.00000003.1174003449.0000000001554000.00000004.00000001.sdmp
            Source: Binary string: C:\Windows\symbols\exe\RegAsm.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: \??\C:\Windows\dll\System.pdb source: RegAsm.exe, 0000000F.00000003.1174003449.0000000001554000.00000004.00000001.sdmp
            Source: Binary string: C:\Windows\dll\System.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: RegAsm.pdb source: dhcpmon.exe, dhcpmon.exe.15.dr
            Source: Binary string: indows\RegAsm.pdbpdbAsm.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: \??\C:\Windows\System.pdb source: RegAsm.exe, 0000000F.00000003.1173973223.000000000150D000.00000004.00000001.sdmp
            Source: Binary string: indows\System.pdbpdbtem.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\symbols\dll\System.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: System.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\System.pdb source: RegAsm.exe, 0000000F.00000002.1212756395.000000001DD55000.00000004.00000040.sdmp

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 0000000F.00000002.1187103126.0000000001002000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6556, type: MEMORY
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01007101 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01006105 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01004109 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01003109 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01007111 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01007125 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_0100612D push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01004135 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_0100713D push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01006141 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_0100614F push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01006159 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01007171 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01006175 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01003179 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01006185 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_0100718D push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01006199 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_010061A9 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_010031B5 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_010061B5 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_010071B5 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_010071D1 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_010061D5 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_010031E5 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_010041ED push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_010041F1 push FFFFFF84h; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_010071F5 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_010041FD push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_010061FF push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01006001 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Users\user\subfolder1\filename1.exeJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

            Boot Survival:

            barindex
            Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
            Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7CFF.tmp'
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe:Zone.Identifier read attributes | delete
            Source: C:\Users\user\Desktop\V33QokMrIv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\V33QokMrIv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\V33QokMrIv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
            Source: C:\Users\user\Desktop\V33QokMrIv.exeRDTSC instruction interceptor: First address: 0000000000626160 second address: 0000000000625B62 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a jmp 00007FCC9C394612h 0x0000000c fnop 0x0000000e jmp 00007FCC9C394612h 0x00000010 test dl, FFFFFF9Ch 0x00000013 jmp 00007FCC9C394612h 0x00000015 test bl, bl 0x00000017 jmp 00007FCC9C394612h 0x00000019 pushad 0x0000001a mov bl, ACh 0x0000001c cmp bl, FFFFFFACh 0x0000001f jne 00007FCC9C391E83h 0x00000025 popad 0x00000026 mov eax, 00000539h 0x0000002b jmp 00007FCC9C394612h 0x0000002d cmp bx, F525h 0x00000032 mov ecx, dword ptr [ebp+1Ch] 0x00000035 mov edx, 8802EDACh 0x0000003a call 00007FCC9C393F5Fh 0x0000003f push esi 0x00000040 push edx 0x00000041 push ecx 0x00000042 jmp 00007FCC9C394612h 0x00000044 pushad 0x00000045 lfence 0x00000048 rdtsc
            Source: C:\Users\user\Desktop\V33QokMrIv.exeRDTSC instruction interceptor: First address: 0000000000623B7D second address: 0000000000623C11 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a xor edi, edi 0x0000000c test bx, ax 0x0000000f mov ecx, 00A95F60h 0x00000014 push ecx 0x00000015 jmp 00007FCC9CA33912h 0x00000017 pushad 0x00000018 mov al, 1Eh 0x0000001a cmp al, 1Eh 0x0000001c jne 00007FCC9CA33799h 0x00000022 popad 0x00000023 call 00007FCC9CA33959h 0x00000028 call 00007FCC9CA33918h 0x0000002d lfence 0x00000030 mov edx, dword ptr [7FFE0014h] 0x00000036 lfence 0x00000039 ret 0x0000003a mov esi, edx 0x0000003c pushad 0x0000003d rdtsc
            Source: C:\Users\user\Desktop\V33QokMrIv.exeRDTSC instruction interceptor: First address: 0000000000623C11 second address: 0000000000623C11 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FCC9C394608h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e jmp 00007FCC9C394612h 0x00000020 test dx, cx 0x00000023 add edi, edx 0x00000025 jmp 00007FCC9C394612h 0x00000027 test bh, ah 0x00000029 dec ecx 0x0000002a cmp eax, ecx 0x0000002c cmp ecx, 00000000h 0x0000002f jne 00007FCC9C3945AAh 0x00000031 push ecx 0x00000032 jmp 00007FCC9C394612h 0x00000034 pushad 0x00000035 mov al, 1Eh 0x00000037 cmp al, 1Eh 0x00000039 jne 00007FCC9C394499h 0x0000003f popad 0x00000040 call 00007FCC9C394659h 0x00000045 call 00007FCC9C394618h 0x0000004a lfence 0x0000004d mov edx, dword ptr [7FFE0014h] 0x00000053 lfence 0x00000056 ret 0x00000057 mov esi, edx 0x00000059 pushad 0x0000005a rdtsc
            Source: C:\Users\user\Desktop\V33QokMrIv.exeRDTSC instruction interceptor: First address: 0000000000624994 second address: 0000000000625B62 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a mov ecx, dword ptr [ebp+1Ch] 0x0000000d jmp 00007FCC9C394612h 0x0000000f test ecx, 0CA7638Eh 0x00000015 mov edx, 8B8E133Dh 0x0000001a test ebx, eax 0x0000001c call 00007FCC9C395789h 0x00000021 push esi 0x00000022 push edx 0x00000023 push ecx 0x00000024 jmp 00007FCC9C394612h 0x00000026 pushad 0x00000027 lfence 0x0000002a rdtsc
            Source: C:\Users\user\Desktop\V33QokMrIv.exeRDTSC instruction interceptor: First address: 0000000000624C68 second address: 0000000000625B62 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a call 00007FCC9CA347D7h 0x0000000f push esi 0x00000010 push edx 0x00000011 push ecx 0x00000012 jmp 00007FCC9CA33912h 0x00000014 pushad 0x00000015 lfence 0x00000018 rdtsc
            Tries to detect Any.runShow sources
            Source: C:\Users\user\Desktop\V33QokMrIv.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\V33QokMrIv.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: RegAsm.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\V33QokMrIv.exeRDTSC instruction interceptor: First address: 0000000000626160 second address: 0000000000625B62 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a jmp 00007FCC9C394612h 0x0000000c fnop 0x0000000e jmp 00007FCC9C394612h 0x00000010 test dl, FFFFFF9Ch 0x00000013 jmp 00007FCC9C394612h 0x00000015 test bl, bl 0x00000017 jmp 00007FCC9C394612h 0x00000019 pushad 0x0000001a mov bl, ACh 0x0000001c cmp bl, FFFFFFACh 0x0000001f jne 00007FCC9C391E83h 0x00000025 popad 0x00000026 mov eax, 00000539h 0x0000002b jmp 00007FCC9C394612h 0x0000002d cmp bx, F525h 0x00000032 mov ecx, dword ptr [ebp+1Ch] 0x00000035 mov edx, 8802EDACh 0x0000003a call 00007FCC9C393F5Fh 0x0000003f push esi 0x00000040 push edx 0x00000041 push ecx 0x00000042 jmp 00007FCC9C394612h 0x00000044 pushad 0x00000045 lfence 0x00000048 rdtsc
            Source: C:\Users\user\Desktop\V33QokMrIv.exeRDTSC instruction interceptor: First address: 0000000000623B7D second address: 0000000000623C11 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a xor edi, edi 0x0000000c test bx, ax 0x0000000f mov ecx, 00A95F60h 0x00000014 push ecx 0x00000015 jmp 00007FCC9CA33912h 0x00000017 pushad 0x00000018 mov al, 1Eh 0x0000001a cmp al, 1Eh 0x0000001c jne 00007FCC9CA33799h 0x00000022 popad 0x00000023 call 00007FCC9CA33959h 0x00000028 call 00007FCC9CA33918h 0x0000002d lfence 0x00000030 mov edx, dword ptr [7FFE0014h] 0x00000036 lfence 0x00000039 ret 0x0000003a mov esi, edx 0x0000003c pushad 0x0000003d rdtsc
            Source: C:\Users\user\Desktop\V33QokMrIv.exeRDTSC instruction interceptor: First address: 0000000000623C11 second address: 0000000000623C11 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FCC9C394608h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e jmp 00007FCC9C394612h 0x00000020 test dx, cx 0x00000023 add edi, edx 0x00000025 jmp 00007FCC9C394612h 0x00000027 test bh, ah 0x00000029 dec ecx 0x0000002a cmp eax, ecx 0x0000002c cmp ecx, 00000000h 0x0000002f jne 00007FCC9C3945AAh 0x00000031 push ecx 0x00000032 jmp 00007FCC9C394612h 0x00000034 pushad 0x00000035 mov al, 1Eh 0x00000037 cmp al, 1Eh 0x00000039 jne 00007FCC9C394499h 0x0000003f popad 0x00000040 call 00007FCC9C394659h 0x00000045 call 00007FCC9C394618h 0x0000004a lfence 0x0000004d mov edx, dword ptr [7FFE0014h] 0x00000053 lfence 0x00000056 ret 0x00000057 mov esi, edx 0x00000059 pushad 0x0000005a rdtsc
            Source: C:\Users\user\Desktop\V33QokMrIv.exeRDTSC instruction interceptor: First address: 0000000000623EAA second address: 0000000000623EAA instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FCC9CA35FE6h 0x0000001d popad 0x0000001e call 00007FCC9CA33971h 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\V33QokMrIv.exeRDTSC instruction interceptor: First address: 0000000000624994 second address: 0000000000625B62 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a mov ecx, dword ptr [ebp+1Ch] 0x0000000d jmp 00007FCC9C394612h 0x0000000f test ecx, 0CA7638Eh 0x00000015 mov edx, 8B8E133Dh 0x0000001a test ebx, eax 0x0000001c call 00007FCC9C395789h 0x00000021 push esi 0x00000022 push edx 0x00000023 push ecx 0x00000024 jmp 00007FCC9C394612h 0x00000026 pushad 0x00000027 lfence 0x0000002a rdtsc
            Source: C:\Users\user\Desktop\V33QokMrIv.exeRDTSC instruction interceptor: First address: 0000000000624C68 second address: 0000000000625B62 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a call 00007FCC9CA347D7h 0x0000000f push esi 0x00000010 push edx 0x00000011 push ecx 0x00000012 jmp 00007FCC9CA33912h 0x00000014 pushad 0x00000015 lfence 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\V33QokMrIv.exeRDTSC instruction interceptor: First address: 0000000000625860 second address: 00000000006259B9 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b push ecx 0x0000000c jmp 00007FCC9C394612h 0x0000000e test edx, eax 0x00000010 push ecx 0x00000011 push eax 0x00000012 push dword ptr [ebp+00000110h] 0x00000018 call 00007FCC9C394713h 0x0000001d mov ecx, dword ptr [esp+0Ch] 0x00000021 mov edx, dword ptr [esp+08h] 0x00000025 jmp 00007FCC9C394612h 0x00000027 pushad 0x00000028 lfence 0x0000002b rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001003EAA second address: 0000000001003EAA instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FCC9CA35FE6h 0x0000001d popad 0x0000001e call 00007FCC9CA33971h 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001001FFF second address: 00000000010059B9 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov dword ptr [edi+00000818h], eax 0x00000011 jmp 00007FCC9C394612h 0x00000013 test bh, dh 0x00000015 mov ebx, dword ptr [edi+3Ch] 0x00000018 add ebx, 000000F8h 0x0000001e mov dword ptr [edi+00000810h], ebx 0x00000024 mov esi, edi 0x00000026 jmp 00007FCC9C394612h 0x00000028 cmp cx, AB77h 0x0000002d add esi, 00001000h 0x00000033 xor edx, edx 0x00000035 push edx 0x00000036 push ebx 0x00000037 push 00000028h 0x00000039 jmp 00007FCC9C394612h 0x0000003b cmp bl, al 0x0000003d mov eax, dword ptr [ebp+20h] 0x00000040 add eax, ebx 0x00000042 push eax 0x00000043 test ax, cx 0x00000046 push esi 0x00000047 call 00007FCC9C397F25h 0x0000004c mov ecx, dword ptr [esp+0Ch] 0x00000050 mov edx, dword ptr [esp+08h] 0x00000054 jmp 00007FCC9C394612h 0x00000056 pushad 0x00000057 lfence 0x0000005a rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 00000000010022AC second address: 00000000010059B9 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 mov dword ptr [ebp+10h], 00000000h 0x0000000a mov dword ptr [ebp+14h], 00000000h 0x00000011 cmp dword ptr [edi+00000814h], 00000000h 0x00000018 je 00007FCC9CA33B5Eh 0x0000001e jmp 00007FCC9CA33912h 0x00000020 cmp bl, al 0x00000022 test ax, cx 0x00000025 jmp 00007FCC9CA33912h 0x00000027 pushad 0x00000028 mov bx, 1417h 0x0000002c cmp bx, 1417h 0x00000031 jne 00007FCC9CA31BADh 0x00000037 popad 0x00000038 test dh, ch 0x0000003a push ecx 0x0000003b cmp edx, edx 0x0000003d mov esi, dword ptr [edi+00000814h] 0x00000043 mov eax, dword ptr [edi+00000800h] 0x00000049 add eax, esi 0x0000004b add eax, ecx 0x0000004d push 00000014h 0x0000004f push eax 0x00000050 mov ebx, edi 0x00000052 add ebx, 00000C00h 0x00000058 push ebx 0x00000059 call 00007FCC9CA36F76h 0x0000005e mov ecx, dword ptr [esp+0Ch] 0x00000062 mov edx, dword ptr [esp+08h] 0x00000066 jmp 00007FCC9CA33912h 0x00000068 pushad 0x00000069 lfence 0x0000006c rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01002990 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWindow / User API: foregroundWindowGot 556
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5808Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5804Thread sleep time: -120000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 6148Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6376Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6820Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: RegAsm.exe, 0000000F.00000002.1191919663.00000000014FB000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
            Source: RegAsm.exe, 0000000F.00000002.1191908435.00000000014F0000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAWen-USn
            Source: RegAsm.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information queried: ProcessInformation

            Anti Debugging:

            barindex
            Hides threads from debuggersShow sources
            Source: C:\Users\user\Desktop\V33QokMrIv.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\V33QokMrIv.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01002990 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01004DA1 LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01006010 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_010039D3 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_010039F5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01006B11 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01006B25 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01005A40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01006AB7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01006AC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_01006AF1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Writes to foreign memory regionsShow sources
            Source: C:\Users\user\Desktop\V33QokMrIv.exeMemory written: C:\Windows\System32\taskhostw.exe base: 1000000
            Source: C:\Users\user\Desktop\V33QokMrIv.exeProcess created: C:\Windows\System32\taskhostw.exe taskhostw.exe None
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7CFF.tmp'
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp801C.tmp'
            Source: RegAsm.exe, 0000000F.00000002.1192015059.0000000001930000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: RegAsm.exe, 0000000F.00000002.1192015059.0000000001930000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: RegAsm.exe, 0000000F.00000002.1192015059.0000000001930000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: RegAsm.exe, 0000000F.00000002.1192015059.0000000001930000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: RegAsm.exe, 0000000F.00000002.1191997352.000000000158D000.00000004.00000001.sdmpBinary or memory string: Program Manager (x86)\DHCP Monitor\dhcpmon.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_010029AD cpuid
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 0000000F.00000002.1253583807.000000001EDB3000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6556, type: MEMORY
            Source: Yara matchFile source: 15.2.RegAsm.exe.1edc7a58.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.RegAsm.exe.1edc7a58.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.RegAsm.exe.1edcc081.3.raw.unpack, type: UNPACKEDPE

            Remote Access Functionality:

            barindex
            Detected Nanocore RatShow sources
            Source: RegAsm.exe, 0000000F.00000002.1253583807.000000001EDB3000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: RegAsm.exe, 0000000F.00000002.1213259233.000000001DD61000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 0000000F.00000002.1253583807.000000001EDB3000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6556, type: MEMORY
            Source: Yara matchFile source: 15.2.RegAsm.exe.1edc7a58.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.RegAsm.exe.1edc7a58.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.RegAsm.exe.1edcc081.3.raw.unpack, type: UNPACKEDPE

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection112Masquerading2Input Capture11Security Software Discovery521Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobRegistry Run Keys / Startup Folder1Scheduled Task/Job1Virtualization/Sandbox Evasion23LSASS MemoryVirtualization/Sandbox Evasion23Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)DLL Side-Loading1Registry Run Keys / Startup Folder1Disable or Modify Tools1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)DLL Side-Loading1Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsSystem Information Discovery212VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsDLL Side-Loading1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 357184 Sample: V33QokMrIv.exe Startdate: 24/02/2021 Architecture: WINDOWS Score: 100 57 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->57 59 Found malware configuration 2->59 61 Malicious sample detected (through community Yara rule) 2->61 63 8 other signatures 2->63 8 V33QokMrIv.exe 1 2->8         started        11 RegAsm.exe 4 2->11         started        14 dhcpmon.exe 4 2->14         started        16 3 other processes 2->16 process3 file4 73 Writes to foreign memory regions 8->73 75 Detected RDTSC dummy instruction sequence (likely for instruction hammering) 8->75 77 Tries to detect Any.run 8->77 79 2 other signatures 8->79 18 RegAsm.exe 2 23 8->18         started        23 taskhostw.exe 8->23         started        49 C:\Users\user\AppData\...\RegAsm.exe.log, ASCII 11->49 dropped 25 conhost.exe 11->25         started        27 conhost.exe 14->27         started        29 conhost.exe 16->29         started        signatures5 process6 dnsIp7 51 194.5.98.202, 4488, 49766, 49767 DANILENKODE Netherlands 18->51 53 onedrive.live.com 18->53 55 2 other IPs or domains 18->55 41 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 18->41 dropped 43 C:\Users\user\AppData\Local\...\tmp7CFF.tmp, XML 18->43 dropped 45 C:\Users\user\subfolder1\filename1.exe, PE32 18->45 dropped 47 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->47 dropped 65 Tries to detect Any.run 18->65 67 Tries to detect virtualization through RDTSC time measurements 18->67 69 Hides threads from debuggers 18->69 71 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->71 31 schtasks.exe 1 23->31         started        33 schtasks.exe 1 23->33         started        35 conhost.exe 23->35         started        file8 signatures9 process10 process11 37 conhost.exe 31->37         started        39 conhost.exe 33->39         started       

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            V33QokMrIv.exe9%ReversingLabsWin32.Trojan.Generic

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs
            C:\Users\user\subfolder1\filename1.exe9%ReversingLabsWin32.Trojan.Generic

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            0%Avira URL Cloudsafe
            194.5.98.2020%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            onedrive.live.com
            unknown
            unknownfalse
              high
              ibkebw.dm.files.1drv.com
              unknown
              unknownfalse
                high

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                true
                • Avira URL Cloud: safe
                low
                194.5.98.202true
                • Avira URL Cloud: safe
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                https://ibkebw.dm.files.1drv.com/RegAsm.exe, 0000000F.00000002.1191880037.00000000014AB000.00000004.00000020.sdmpfalse
                  high
                  https://onedrive.live.com/download?cid=802AC8A73EEC8C8E&resid=802AC8A73EEC8C8E%21110&authkey=AK1w6-PRegAsm.exe, RegAsm.exe, 0000000F.00000002.1191880037.00000000014AB000.00000004.00000020.sdmpfalse
                    high
                    https://onedrive.live.com/zZmRegAsm.exe, 0000000F.00000002.1191880037.00000000014AB000.00000004.00000020.sdmpfalse
                      high
                      https://ibkebw.dm.files.1drv.com/y4m_7vjlVAP2dktIZ7ToWB_X8Tx5mpxc0CHqB4Dc4Xc8QJNrWia8ZAB0h8vRJGCEryLRegAsm.exe, 0000000F.00000003.1173973223.000000000150D000.00000004.00000001.sdmp, RegAsm.exe, 0000000F.00000002.1191919663.00000000014FB000.00000004.00000020.sdmpfalse
                        high
                        https://onedrive.live.com/RegAsm.exe, 0000000F.00000002.1191880037.00000000014AB000.00000004.00000020.sdmpfalse
                          high
                          https://ibkebw.dm.files.1drv.com/JepRegAsm.exe, 0000000F.00000002.1191880037.00000000014AB000.00000004.00000020.sdmpfalse
                            high

                            Contacted IPs

                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs

                            Public

                            IPDomainCountryFlagASNASN NameMalicious
                            194.5.98.202
                            unknownNetherlands
                            208476DANILENKODEtrue

                            General Information

                            Joe Sandbox Version:31.0.0 Emerald
                            Analysis ID:357184
                            Start date:24.02.2021
                            Start time:09:23:21
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 11m 23s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:V33QokMrIv.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:30
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@19/12@2/1
                            EGA Information:Failed
                            HDC Information:Failed
                            HCA Information:
                            • Successful, ratio: 93%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240s for sample files taking high CPU consumption
                            Warnings:
                            Show All
                            • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
                            • TCP Packets have been reduced to 100
                            • Excluded IPs from analysis (whitelisted): 52.113.196.254, 13.107.3.254, 13.64.90.137, 52.255.188.83, 13.88.21.125, 51.104.139.180, 52.155.217.156, 20.54.26.129, 92.122.213.194, 92.122.213.247, 13.107.43.13, 13.107.43.12, 20.190.160.6, 20.190.160.75, 20.190.160.69, 20.190.160.134, 20.190.160.132, 20.190.160.71, 20.190.160.73, 20.190.160.136, 51.11.168.232
                            • Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, odc-dm-files-geo.onedrive.akadns.net, arc.msn.com.nsatc.net, s-ring.msedge.net, www.tm.lg.prod.aadmsa.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, l-0004.dc-msedge.net, www.tm.a.prd.aadg.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, teams-9999.teams-msedge.net, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, odc-dm-files.onedrive.akadns.net.l-0003.dc-msedge.net.l-0003.l-msedge.net, ams2.next.a.prd.aadg.trafficmanager.net, login.live.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, odc-dm-files-brs.onedrive.akadns.net, odc-web-geo.onedrive.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, l-0003.dc-msedge.net, settings-win.data.microsoft.com, s-ring.s-9999.s-msedge.net, login.msa.msidentity.com, settingsfd-geo.trafficmanager.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, s-9999.s-msedge.net, blobcollector.events.data.trafficmanager.net, teams-ring.teams-9999.teams-msedge.net, teams-ring.msedge.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: /opt/package/joesandbox/database/analysis/357184/sample/V33QokMrIv.exe

                            Simulations

                            Behavior and APIs

                            TimeTypeDescription
                            09:26:25AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\subfolder1\filename1.exe
                            09:26:29Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" s>$(Arg0)
                            09:26:29API Interceptor666x Sleep call for process: RegAsm.exe modified
                            09:26:30Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                            09:26:33AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            09:26:41AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\subfolder1\filename1.exe

                            Joe Sandbox View / Context

                            IPs

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            194.5.98.202DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909_RAW.docGet hashmaliciousBrowse

                              Domains

                              No context

                              ASN

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              DANILENKODE3Fv4j323nj.exeGet hashmaliciousBrowse
                              • 194.5.98.182
                              scan09e8902093922023ce.exeGet hashmaliciousBrowse
                              • 194.5.98.46
                              PO AAN2102002-V020.docGet hashmaliciousBrowse
                              • 194.5.98.182
                              DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909_RAW.docGet hashmaliciousBrowse
                              • 194.5.98.202
                              neue bestellung.PDF.exeGet hashmaliciousBrowse
                              • 194.5.97.48
                              Orderoffer.exeGet hashmaliciousBrowse
                              • 194.5.98.66
                              neue bestellung.PDF.exeGet hashmaliciousBrowse
                              • 194.5.97.48
                              OrderSuppliesQuote0817916.exeGet hashmaliciousBrowse
                              • 194.5.97.248
                              DHL_6368638172 documento de recibo,pdf.exeGet hashmaliciousBrowse
                              • 194.5.97.244
                              QuotationInvoices.exeGet hashmaliciousBrowse
                              • 194.5.97.248
                              PAYMENT_.EXEGet hashmaliciousBrowse
                              • 194.5.98.211
                              payment.exeGet hashmaliciousBrowse
                              • 194.5.98.66
                              RFQ_1101983736366355 1101938377388.exeGet hashmaliciousBrowse
                              • 194.5.98.21
                              Slip copy .xls.exeGet hashmaliciousBrowse
                              • 194.5.97.116
                              Scan0059.pdf.exeGet hashmaliciousBrowse
                              • 194.5.97.34
                              DHL AWB # 6008824216.png.exeGet hashmaliciousBrowse
                              • 194.5.97.48
                              Scan0019.exeGet hashmaliciousBrowse
                              • 194.5.97.34
                              PurchaseOrdersCSTtyres004786587.exeGet hashmaliciousBrowse
                              • 194.5.97.248
                              Invoice467972.jarGet hashmaliciousBrowse
                              • 194.5.97.18
                              Invoice467972.jarGet hashmaliciousBrowse
                              • 194.5.97.18

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe3Fv4j323nj.exeGet hashmaliciousBrowse
                                SecuriteInfo.com.Variant.Razy.845229.13077.exeGet hashmaliciousBrowse
                                  document.exeGet hashmaliciousBrowse
                                    w0JlVAbpIT.exeGet hashmaliciousBrowse
                                      Bjdl7RO0K8.exeGet hashmaliciousBrowse
                                        4hW0TZqN01.exeGet hashmaliciousBrowse
                                          d4e475d7d17a16be8b9eeac6e10b25af.exeGet hashmaliciousBrowse
                                            e5bd3238d220c97cd4d6969abb3b33e0.exeGet hashmaliciousBrowse
                                              1c2dec9cbfcd95afe13bf71910fdf95f.exeGet hashmaliciousBrowse
                                                Xf6v0G2wIM.exeGet hashmaliciousBrowse
                                                  jztWD1iKrC.exeGet hashmaliciousBrowse
                                                    wH22vdkhhU.exeGet hashmaliciousBrowse
                                                      AqpOn6nwXS.exeGet hashmaliciousBrowse
                                                        CklrD7MYX2.exeGet hashmaliciousBrowse
                                                          FahZG6Pdc4.exeGet hashmaliciousBrowse
                                                            61WlCsQR9Q.exeGet hashmaliciousBrowse
                                                              U7DiqWP9qu.exeGet hashmaliciousBrowse
                                                                d4x5rI09A7.exeGet hashmaliciousBrowse
                                                                  1WW425NrsA.exeGet hashmaliciousBrowse
                                                                    Kyd6mztyQ5.exeGet hashmaliciousBrowse

                                                                      Created / dropped Files

                                                                      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                                      File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):53248
                                                                      Entropy (8bit):4.490095782293901
                                                                      Encrypted:false
                                                                      SSDEEP:768:0P2Bbv+VazyoD2z9TU//1mz1+M9GnLEu+2wTFRJS8Ulg:HJv46yoD2BTNz1+M9GLfOw8UO
                                                                      MD5:529695608EAFBED00ACA9E61EF333A7C
                                                                      SHA1:68CA8B6D8E74FA4F4EE603EB862E36F2A73BC1E5
                                                                      SHA-256:44F129DE312409D8A2DF55F655695E1D48D0DB6F20C5C7803EB0032D8E6B53D0
                                                                      SHA-512:8FE476E0185B2B0C66F34E51899B932CB35600C753D36FE102BDA5894CDAA58410044E0A30FDBEF76A285C2C75018D7C5A9BA0763D45EC605C2BBD1EBB9ED674
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: Metadefender, Detection: 0%, Browse
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      Joe Sandbox View:
                                                                      • Filename: 3Fv4j323nj.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.Variant.Razy.845229.13077.exe, Detection: malicious, Browse
                                                                      • Filename: document.exe, Detection: malicious, Browse
                                                                      • Filename: w0JlVAbpIT.exe, Detection: malicious, Browse
                                                                      • Filename: Bjdl7RO0K8.exe, Detection: malicious, Browse
                                                                      • Filename: 4hW0TZqN01.exe, Detection: malicious, Browse
                                                                      • Filename: d4e475d7d17a16be8b9eeac6e10b25af.exe, Detection: malicious, Browse
                                                                      • Filename: e5bd3238d220c97cd4d6969abb3b33e0.exe, Detection: malicious, Browse
                                                                      • Filename: 1c2dec9cbfcd95afe13bf71910fdf95f.exe, Detection: malicious, Browse
                                                                      • Filename: Xf6v0G2wIM.exe, Detection: malicious, Browse
                                                                      • Filename: jztWD1iKrC.exe, Detection: malicious, Browse
                                                                      • Filename: wH22vdkhhU.exe, Detection: malicious, Browse
                                                                      • Filename: AqpOn6nwXS.exe, Detection: malicious, Browse
                                                                      • Filename: CklrD7MYX2.exe, Detection: malicious, Browse
                                                                      • Filename: FahZG6Pdc4.exe, Detection: malicious, Browse
                                                                      • Filename: 61WlCsQR9Q.exe, Detection: malicious, Browse
                                                                      • Filename: U7DiqWP9qu.exe, Detection: malicious, Browse
                                                                      • Filename: d4x5rI09A7.exe, Detection: malicious, Browse
                                                                      • Filename: 1WW425NrsA.exe, Detection: malicious, Browse
                                                                      • Filename: Kyd6mztyQ5.exe, Detection: malicious, Browse
                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{Z..................... .......... ........@.. ..............................N.....@.....................................O................................... ................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\RegAsm.exe.log
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:modified
                                                                      Size (bytes):20
                                                                      Entropy (8bit):3.6841837197791887
                                                                      Encrypted:false
                                                                      SSDEEP:3:QHXMKas:Q3Las
                                                                      MD5:B3AC9D09E3A47D5FD00C37E075A70ECB
                                                                      SHA1:AD14E6D0E07B00BD10D77A06D68841B20675680B
                                                                      SHA-256:7A23C6E7CCD8811ECDF038D3A89D5C7D68ED37324BAE2D4954125D9128FA9432
                                                                      SHA-512:09B609EE1061205AA45B3C954EFC6C1A03C8FD6B3011FF88CF2C060E19B1D7FD51EE0CB9D02A39310125F3A66AA0146261BDEE3D804F472034DF711BC942E316
                                                                      Malicious:true
                                                                      Preview: 1,"fusion","GAC",0..
                                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                                      Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:modified
                                                                      Size (bytes):20
                                                                      Entropy (8bit):3.6841837197791887
                                                                      Encrypted:false
                                                                      SSDEEP:3:QHXMKas:Q3Las
                                                                      MD5:B3AC9D09E3A47D5FD00C37E075A70ECB
                                                                      SHA1:AD14E6D0E07B00BD10D77A06D68841B20675680B
                                                                      SHA-256:7A23C6E7CCD8811ECDF038D3A89D5C7D68ED37324BAE2D4954125D9128FA9432
                                                                      SHA-512:09B609EE1061205AA45B3C954EFC6C1A03C8FD6B3011FF88CF2C060E19B1D7FD51EE0CB9D02A39310125F3A66AA0146261BDEE3D804F472034DF711BC942E316
                                                                      Malicious:false
                                                                      Preview: 1,"fusion","GAC",0..
                                                                      C:\Users\user\AppData\Local\Temp\tmp7CFF.tmp
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1319
                                                                      Entropy (8bit):5.133606110275315
                                                                      Encrypted:false
                                                                      SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mne5xtn:cbk4oL600QydbQxIYODOLedq3Ze5j
                                                                      MD5:C6F0625BF4C1CDFB699980C9243D3B22
                                                                      SHA1:43DE1FE580576935516327F17B5DA0C656C72851
                                                                      SHA-256:8DFC4E937F0B2374E3CED25FCE344B0731CF44B8854625B318D50ECE2DA8F576
                                                                      SHA-512:9EF2DBD4142AD0E1E6006929376ECB8011E7FFC801EE2101E906787D70325AD82752DF65839DE9972391FA52E1E5974EC1A5C7465A88AA56257633EBB7D70969
                                                                      Malicious:true
                                                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                      C:\Users\user\AppData\Local\Temp\tmp801C.tmp
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1310
                                                                      Entropy (8bit):5.109425792877704
                                                                      Encrypted:false
                                                                      SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                                      MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                                      SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                                      SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                                      SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                                      Malicious:false
                                                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                      C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):928
                                                                      Entropy (8bit):7.024371743172393
                                                                      Encrypted:false
                                                                      SSDEEP:24:IQnybgCUtvd7xCFhwUuQnybgCUtvd7xCFhwUuQnybgCUtvd7xCFhwUuQnybgCUtw:Ik/lCrwfk/lCrwfk/lCrwfk/lCrw8
                                                                      MD5:CCB690520E68EE385ACC0ACFE759AFFC
                                                                      SHA1:33F0DA3F55E5B3C5AC19B61D31471CB60BCD5C96
                                                                      SHA-256:166154225DAB5FCB79C1CA97D371B159D37B83FBC0ADABCD8EBA98FA113A7A3B
                                                                      SHA-512:AC4F3CF1F8F460745D37E6350861C2FBCDDCC1BBDE0A48FB361BFBF5B1EBF10A05F798A72CE413FCA073FF8108955353DDBCBD9D50CED6CDAE231C67A28FDDA3
                                                                      Malicious:false
                                                                      Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                                                      C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                                      File Type:Non-ISO extended-ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):8
                                                                      Entropy (8bit):2.75
                                                                      Encrypted:false
                                                                      SSDEEP:3:zTn:zTn
                                                                      MD5:92E49A758034CCCB53F7E0C2540D8D1F
                                                                      SHA1:A110CF375A1151871163162E42572DB30665F4DD
                                                                      SHA-256:C7CB3AE57F1E7A86EDD4CBBB313AB5E1BDF253C6205AB1B2188DD27F44C6D11C
                                                                      SHA-512:376B05470948B965687BD787F2FF2A81B62F2D3157FD9213DD2D885453FE05FBFB0E6B4EF3F71774B6CA1A9AEE215DA5756F3E679C075B89D112E9225D055128
                                                                      Malicious:true
                                                                      Preview: 3YR...H
                                                                      C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):56
                                                                      Entropy (8bit):4.787365359936823
                                                                      Encrypted:false
                                                                      SSDEEP:3:oMty8WbSXgL4A:oMLWuQL4A
                                                                      MD5:EFD1636CFC3CC38FD7BABAE5CAC9EDE0
                                                                      SHA1:4D7D378ABEB682EEFBD039930C0EA996FBF54178
                                                                      SHA-256:F827D5B11C1EB3902D601C3E0B59BA32FE11C0B573FBF22FB2AF86BFD4651BBA
                                                                      SHA-512:69B2B0AB1A6E13395EF52DCB903B8E17D842E6D0D44F801FF2659CFD5EC343C8CC57928B02961FC7099AD43FF05633BAF5AC39042A00C8676D4FA8F6F8C2A5D7
                                                                      Malicious:false
                                                                      Preview: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                                      C:\Users\user\subfolder1\filename1.exe
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):131072
                                                                      Entropy (8bit):4.886067635976852
                                                                      Encrypted:false
                                                                      SSDEEP:1536:uWWTwV4fVhuoUaaAAwT4uv65YEWDTkIlmak5AEivuxVQwV4MjW:2wVUPOpUlviYEWnkIlmak5zivQqwV
                                                                      MD5:E18DBE57194DD717D54A907BA8E6D3E1
                                                                      SHA1:76BACC8C5FBBF675399C39C42565DFC3D77BE98B
                                                                      SHA-256:B5D510179AB07F09C10CFA2EA9D95346FB696AFD3F642AF2882B3F4CD16D3FF5
                                                                      SHA-512:B5B4064FB475590E7EBFA51857117E5C8DAC0C98402809856CD17CF40EDBF455A28ECAB9BD4B431997C50AC1767AB7724F79ED356C33690AA9CB2DCDF38F7968
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 9%
                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.....0...~..0......0...Rich1...........PE..L....bW.................P...................`....@.........................................................................tY..(....p......................................................................(... ....................................text....M.......P.................. ..`.data........`.......`..............@....rsrc........p.......p..............@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      \Device\ConDrv
                                                                      Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1010
                                                                      Entropy (8bit):4.298581893109255
                                                                      Encrypted:false
                                                                      SSDEEP:24:zKTDwL/0XZd3Wo3opQ5ZKBQFYVgt7ovrNOYlK:zKTDwAXZxo4ABV+SrUYE
                                                                      MD5:367EEEC425FE7E80B723298C447E2F22
                                                                      SHA1:3873DFC88AF504FF79231FE2BF0E3CD93CE45195
                                                                      SHA-256:481A7A3CA0DD32DA4772718BA4C1EF3F01E8D184FE82CF6E9C5386FD343264BC
                                                                      SHA-512:F7101541D87F045E9DBC45941CDC5A7F97F3EFC29AC0AF2710FC24FA64F0163F9463DE373A5D2BE1270126829DE81006FB8E764186374966E8D0E9BB35B7D7D6
                                                                      Malicious:false
                                                                      Preview: Microsoft (R) .NET Framework Assembly Registration Utility 2.0.50727.8922..Copyright (C) Microsoft Corporation 1998-2004. All rights reserved.....Syntax: RegAsm AssemblyName [Options]..Options:.. /unregister Unregister types.. /tlb[:FileName] Export the assembly to the specified type library.. and register it.. /regfile[:FileName] Generate a reg file with the specified name.. instead of registering the types. This option.. cannot be used with the /u or /tlb options.. /codebase Set the code base in the registry.. /registered Only refer to already registered type libraries.. /asmpath:Directory Look for assembly references here.. /nologo Prevents RegAsm from displaying logo.. /silent Silent mode. Prevents displaying of success messages.. /verbose Displays extra information.. /? or /help Display this usage

                                                                      Static File Info

                                                                      General

                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Entropy (8bit):4.886067635976852
                                                                      TrID:
                                                                      • Win32 Executable (generic) a (10002005/4) 99.15%
                                                                      • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:V33QokMrIv.exe
                                                                      File size:131072
                                                                      MD5:e18dbe57194dd717d54a907ba8e6d3e1
                                                                      SHA1:76bacc8c5fbbf675399c39c42565dfc3d77be98b
                                                                      SHA256:b5d510179ab07f09c10cfa2ea9d95346fb696afd3f642af2882b3f4cd16d3ff5
                                                                      SHA512:b5b4064fb475590e7ebfa51857117e5c8dac0c98402809856cd17cf40edbf455a28ecab9bd4b431997c50ac1767ab7724f79ed356c33690aa9cb2dcdf38f7968
                                                                      SSDEEP:1536:uWWTwV4fVhuoUaaAAwT4uv65YEWDTkIlmak5AEivuxVQwV4MjW:2wVUPOpUlviYEWnkIlmak5zivQqwV
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.......0...~...0.......0...Rich1...........PE..L.....bW.................P...................`....@................

                                                                      File Icon

                                                                      Icon Hash:01d292796dda0080

                                                                      Static PE Info

                                                                      General

                                                                      Entrypoint:0x4013dc
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                                      DLL Characteristics:
                                                                      Time Stamp:0x57629AC2 [Thu Jun 16 12:25:38 2016 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:cc882d101998a701353b40b0cd8c341a

                                                                      Entrypoint Preview

                                                                      Instruction
                                                                      push 00412778h
                                                                      call 00007FCC9CB3C453h
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      xor byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      cmp byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      cdq
                                                                      push edx
                                                                      movsd
                                                                      inc esp
                                                                      pop edi
                                                                      test al, 15h
                                                                      inc esp
                                                                      cdq
                                                                      das
                                                                      xchg eax, ecx
                                                                      mov al, byte ptr [1610F6ADh]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add dword ptr [eax], eax
                                                                      add byte ptr [eax], al
                                                                      xor cl, byte ptr [7061430Ah]
                                                                      push esi
                                                                      inc ecx
                                                                      push edx
                                                                      inc ebp
                                                                      push esp
                                                                      dec edi
                                                                      inc edi
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add bh, bh
                                                                      int3
                                                                      xor dword ptr [eax], eax
                                                                      add al, 8Fh
                                                                      outsd
                                                                      mov edx, 7A63B091h
                                                                      inc edi
                                                                      sbb dword ptr [eax+2FFB4570h], FFFFFFC3h
                                                                      int 7Bh
                                                                      cdq
                                                                      adc ch, 00000022h
                                                                      xchg dword ptr [edx+4Fh], esi
                                                                      mov bl, 6Ch
                                                                      out dx, al
                                                                      xor byte ptr [ecx], al
                                                                      push es
                                                                      jle 00007FCC9CB3C3EDh
                                                                      cmp cl, byte ptr [edi-53h]
                                                                      xor ebx, dword ptr [ecx-48EE309Ah]
                                                                      or al, 00h
                                                                      stosb
                                                                      add byte ptr [eax-2Dh], ah
                                                                      xchg eax, ebx
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      mov eax, dword ptr [A5000112h]
                                                                      jnle 00007FCC9CB3C462h
                                                                      add byte ptr [eax], al
                                                                      adc al, byte ptr [eax]
                                                                      push esp
                                                                      push ebp
                                                                      inc edx
                                                                      inc ebp
                                                                      push edx
                                                                      inc ebx
                                                                      push ebp
                                                                      dec esp
                                                                      inc ecx
                                                                      push esp
                                                                      dec edi
                                                                      push ebx
                                                                      push eax
                                                                      dec ecx
                                                                      dec esi
                                                                      dec edi
                                                                      push ebp
                                                                      push ebx
                                                                      add byte ptr [42000A01h], cl
                                                                      jne 00007FCC9CB3C4D0h
                                                                      add byte ptr fs:[eax], al

                                                                      Data Directories

                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x159740x28.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x170000x83f6.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x10000xe0.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                      Sections

                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x10000x14da40x15000False0.404203869048data5.57673610906IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                      .data0x160000xa180x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0x170000x83f60x9000False0.340494791667data3.53320400461IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                                      Resources

                                                                      NameRVASizeTypeLanguageCountry
                                                                      RT_ICON0x1f2ce0x128GLS_BINARY_LSB_FIRST
                                                                      RT_ICON0x1dca60x1628dBase IV DBT of \200.DBF, blocks size 0, block length 4608, next free block index 40, next free block 0, next used block 0
                                                                      RT_ICON0x1bffe0x1ca8data
                                                                      RT_ICON0x1b3560xca8data
                                                                      RT_ICON0x1afee0x368GLS_BINARY_LSB_FIRST
                                                                      RT_ICON0x18a460x25a8data
                                                                      RT_ICON0x1799e0x10a8data
                                                                      RT_ICON0x175360x468GLS_BINARY_LSB_FIRST
                                                                      RT_GROUP_ICON0x174c00x76data
                                                                      RT_VERSION0x172400x280data

                                                                      Imports

                                                                      DLLImport
                                                                      MSVBVM60.DLL_CIcos, _adj_fptan, __vbaFreeVar, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaLateMemCall, __vbaVarDup, _CIatan, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

                                                                      Version Infos

                                                                      DescriptionData
                                                                      Translation0x0000 0x04b0
                                                                      InternalNameKARAKTERISTIKONS
                                                                      FileVersion1.00
                                                                      CompanyNameSinth Radio
                                                                      ProductNameSinth Radio
                                                                      ProductVersion1.00
                                                                      FileDescriptionSinth Radio
                                                                      OriginalFilenameKARAKTERISTIKONS.exe

                                                                      Network Behavior

                                                                      Snort IDS Alerts

                                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                      02/24/21-09:26:30.194652TCP2025019ET TROJAN Possible NanoCore C2 60B497664488192.168.2.4194.5.98.202
                                                                      02/24/21-09:26:36.466553TCP2025019ET TROJAN Possible NanoCore C2 60B497674488192.168.2.4194.5.98.202
                                                                      02/24/21-09:26:42.713931TCP2025019ET TROJAN Possible NanoCore C2 60B497684488192.168.2.4194.5.98.202
                                                                      02/24/21-09:26:49.051394TCP2025019ET TROJAN Possible NanoCore C2 60B497694488192.168.2.4194.5.98.202

                                                                      Network Port Distribution

                                                                      TCP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Feb 24, 2021 09:26:29.759485960 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:30.072976112 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:30.073151112 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:30.194652081 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:30.519912004 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:30.520106077 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:30.579900026 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:30.621732950 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:30.817673922 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:30.817770004 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:31.072177887 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:31.072329998 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:31.379748106 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:31.379842043 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:31.865875959 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:31.865948915 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:31.897878885 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:31.897898912 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:31.897965908 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:31.898910046 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:31.898935080 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:31.898964882 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:31.898991108 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:31.900007010 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:31.900026083 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:31.900054932 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:31.900068998 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:31.900100946 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:31.900779963 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:31.900842905 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:31.900964975 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:31.900985003 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:31.901024103 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:31.901043892 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.147021055 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.147356033 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.148334980 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.148435116 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.155035973 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.155081987 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.155155897 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.155174017 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.157094955 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.157135010 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.157166004 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.157191038 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.157259941 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.157358885 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.158186913 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.158226013 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.158242941 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.158289909 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.158941984 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.158981085 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.158999920 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.159012079 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.159029007 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.159085035 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.159105062 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.159154892 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.160456896 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.160502911 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.160518885 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.160587072 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.160630941 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.160686016 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.161052942 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.161092043 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.161123991 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.161134958 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.163206100 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.163245916 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.163291931 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.163326979 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.186757088 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.428322077 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.428378105 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.428481102 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.428503990 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.428936958 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.429208994 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.429279089 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.430398941 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.430552959 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.430603981 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.430718899 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.431397915 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.431442976 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.431495905 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.432112932 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.432153940 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.432179928 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.432225943 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.434156895 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.434190035 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.434241056 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.434262037 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.434284925 CET448849766194.5.98.202192.168.2.4
                                                                      Feb 24, 2021 09:26:32.434326887 CET497664488192.168.2.4194.5.98.202
                                                                      Feb 24, 2021 09:26:32.434345007 CET448849766194.5.98.202192.168.2.4

                                                                      UDP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Feb 24, 2021 09:24:01.168829918 CET4971453192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:01.217495918 CET53497148.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:01.496834040 CET5802853192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:01.545589924 CET53580288.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:02.737222910 CET5309753192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:02.789077044 CET53530978.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:03.904197931 CET4925753192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:03.954843998 CET53492578.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:04.748075962 CET6238953192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:04.799927950 CET53623898.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:06.179506063 CET4991053192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:06.228266954 CET53499108.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:07.560776949 CET5585453192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:07.622188091 CET53558548.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:08.894939899 CET6454953192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:08.949863911 CET53645498.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:11.116444111 CET6315353192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:11.166915894 CET53631538.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:17.570039988 CET5299153192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:17.618900061 CET53529918.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:28.313499928 CET5370053192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:28.365087986 CET53537008.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:29.132186890 CET5172653192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:29.184046984 CET53517268.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:30.045975924 CET5679453192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:30.095005989 CET53567948.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:30.917124033 CET5653453192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:30.967005968 CET53565348.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:32.215751886 CET5662753192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:32.267752886 CET53566278.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:32.378673077 CET5662153192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:32.427474976 CET53566218.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:33.902875900 CET6311653192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:33.951662064 CET53631168.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:35.413022995 CET6407853192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:35.465909004 CET53640788.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:41.079289913 CET6480153192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:41.127976894 CET53648018.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:42.642734051 CET6172153192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:42.692765951 CET53617218.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:46.903964043 CET5125553192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:46.955904961 CET53512558.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:24:59.856170893 CET6152253192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:24:59.931910038 CET53615228.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:25:00.631495953 CET5233753192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:25:00.732729912 CET53523378.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:25:01.512803078 CET5504653192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:25:01.581609964 CET53550468.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:25:02.044190884 CET4961253192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:25:02.101701021 CET53496128.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:25:02.605772972 CET4928553192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:25:02.663177967 CET53492858.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:25:03.188625097 CET5060153192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:25:03.251790047 CET53506018.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:25:03.889224052 CET6087553192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:25:03.937957048 CET53608758.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:25:04.678129911 CET5644853192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:25:04.744019032 CET53564488.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:25:05.883210897 CET5917253192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:25:05.946980000 CET53591728.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:25:06.425657034 CET6242053192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:25:06.499449968 CET53624208.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:25:06.626337051 CET6057953192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:25:06.692455053 CET53605798.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:25:14.779095888 CET5018353192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:25:14.838089943 CET53501838.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:25:42.622454882 CET6153153192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:25:42.673011065 CET53615318.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:25:46.251863003 CET4922853192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:25:46.320204020 CET53492288.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:26:25.442338943 CET5979453192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:26:25.502111912 CET53597948.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:26:26.115159035 CET5591653192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:26:26.206942081 CET53559168.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:28:59.089103937 CET5275253192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:28:59.142637968 CET53527528.8.8.8192.168.2.4
                                                                      Feb 24, 2021 09:29:00.463768959 CET6054253192.168.2.48.8.8.8
                                                                      Feb 24, 2021 09:29:00.531222105 CET53605428.8.8.8192.168.2.4

                                                                      DNS Queries

                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                      Feb 24, 2021 09:26:25.442338943 CET192.168.2.48.8.8.80x20d9Standard query (0)onedrive.live.comA (IP address)IN (0x0001)
                                                                      Feb 24, 2021 09:26:26.115159035 CET192.168.2.48.8.8.80x936Standard query (0)ibkebw.dm.files.1drv.comA (IP address)IN (0x0001)

                                                                      DNS Answers

                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                      Feb 24, 2021 09:26:25.502111912 CET8.8.8.8192.168.2.40x20d9No error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                                                      Feb 24, 2021 09:26:26.206942081 CET8.8.8.8192.168.2.40x936No error (0)ibkebw.dm.files.1drv.comdm-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                                                                      Feb 24, 2021 09:26:26.206942081 CET8.8.8.8192.168.2.40x936No error (0)dm-files.fe.1drv.comodc-dm-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                                                      Feb 24, 2021 09:28:59.142637968 CET8.8.8.8192.168.2.40xf14eNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)

                                                                      Code Manipulations

                                                                      Statistics

                                                                      Behavior

                                                                      Click to jump to process

                                                                      System Behavior

                                                                      General

                                                                      Start time:09:24:09
                                                                      Start date:24/02/2021
                                                                      Path:C:\Users\user\Desktop\V33QokMrIv.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\Desktop\V33QokMrIv.exe'
                                                                      Imagebase:0x400000
                                                                      File size:131072 bytes
                                                                      MD5 hash:E18DBE57194DD717D54A907BA8E6D3E1
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:Visual Basic
                                                                      Reputation:low

                                                                      General

                                                                      Start time:09:24:47
                                                                      Start date:24/02/2021
                                                                      Path:C:\Windows\System32\taskhostw.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:taskhostw.exe None
                                                                      Imagebase:0x7ff73c340000
                                                                      File size:87904 bytes
                                                                      MD5 hash:CE95E236FC9FE2D6F16C926C75B18BAF
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate

                                                                      General

                                                                      Start time:09:26:10
                                                                      Start date:24/02/2021
                                                                      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\Desktop\V33QokMrIv.exe'
                                                                      Imagebase:0xc00000
                                                                      File size:53248 bytes
                                                                      MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.1253583807.000000001EDB3000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 0000000F.00000002.1187103126.0000000001002000.00000040.00000001.sdmp, Author: Joe Security
                                                                      Reputation:high

                                                                      General

                                                                      Start time:09:26:11
                                                                      Start date:24/02/2021
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff724c50000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:09:26:27
                                                                      Start date:24/02/2021
                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7CFF.tmp'
                                                                      Imagebase:0x920000
                                                                      File size:185856 bytes
                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:09:26:27
                                                                      Start date:24/02/2021
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff724c50000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:09:26:28
                                                                      Start date:24/02/2021
                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp801C.tmp'
                                                                      Imagebase:0x920000
                                                                      File size:185856 bytes
                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:09:26:28
                                                                      Start date:24/02/2021
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff724c50000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:09:26:29
                                                                      Start date:24/02/2021
                                                                      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 0
                                                                      Imagebase:0x150000
                                                                      File size:53248 bytes
                                                                      MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Reputation:high

                                                                      General

                                                                      Start time:09:26:30
                                                                      Start date:24/02/2021
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff724c50000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:09:26:30
                                                                      Start date:24/02/2021
                                                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                                      Imagebase:0x740000
                                                                      File size:53248 bytes
                                                                      MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Antivirus matches:
                                                                      • Detection: 0%, Metadefender, Browse
                                                                      • Detection: 0%, ReversingLabs
                                                                      Reputation:high

                                                                      General

                                                                      Start time:09:26:30
                                                                      Start date:24/02/2021
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff724c50000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:09:26:33
                                                                      Start date:24/02/2021
                                                                      Path:C:\Users\user\subfolder1\filename1.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\subfolder1\filename1.exe'
                                                                      Imagebase:0x400000
                                                                      File size:131072 bytes
                                                                      MD5 hash:E18DBE57194DD717D54A907BA8E6D3E1
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:Visual Basic
                                                                      Antivirus matches:
                                                                      • Detection: 9%, ReversingLabs
                                                                      Reputation:low

                                                                      General

                                                                      Start time:09:26:41
                                                                      Start date:24/02/2021
                                                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                      Imagebase:0x1f0000
                                                                      File size:53248 bytes
                                                                      MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Reputation:high

                                                                      General

                                                                      Start time:09:26:42
                                                                      Start date:24/02/2021
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff724c50000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language

                                                                      General

                                                                      Start time:09:26:50
                                                                      Start date:24/02/2021
                                                                      Path:C:\Users\user\subfolder1\filename1.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\subfolder1\filename1.exe'
                                                                      Imagebase:0x400000
                                                                      File size:131072 bytes
                                                                      MD5 hash:E18DBE57194DD717D54A907BA8E6D3E1
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:Visual Basic

                                                                      Disassembly

                                                                      Code Analysis

                                                                      Reset < >