Loading ...

Play interactive tourEdit tour

Analysis Report Y5XyMnx8Ng.exe

Overview

General Information

Sample Name:Y5XyMnx8Ng.exe
Analysis ID:357424
MD5:5bd6a6dbda26ada813c6f60fdfc7ba70
SHA1:20d05385be36213404ca178bf15e39d0587dd73f
SHA256:205f2ef71a4a099b8cac6b0df7be7d04f5ca0c65e31fb1c00158f656cf2785c3
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • Y5XyMnx8Ng.exe (PID: 6372 cmdline: 'C:\Users\user\Desktop\Y5XyMnx8Ng.exe' MD5: 5BD6A6DBDA26ADA813C6F60FDFC7BA70)
    • schtasks.exe (PID: 5812 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LbSNAHQmeXYAoG' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EF2.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 3180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 5464 cmdline: {path} MD5: 71369277D09DA0830C8C59F9E22BB23A)
      • schtasks.exe (PID: 6292 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp3911.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6352 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp3C8D.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 1968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • RegSvcs.exe (PID: 6384 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0 MD5: 71369277D09DA0830C8C59F9E22BB23A)
    • conhost.exe (PID: 2172 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6200 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 71369277D09DA0830C8C59F9E22BB23A)
    • conhost.exe (PID: 5828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6404 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 71369277D09DA0830C8C59F9E22BB23A)
    • conhost.exe (PID: 5680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "572eb7a9-aedf-4b39-8669-f7563dab8a38", "Group": "GREAT", "Domain1": "strongodss.ddns.net", "Domain2": "79.134.225.43", "Port": 58103, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Enable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8009, "BufferSize": "02000100", "MaxPacketSize": "", "GCThreshold": "", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000002.494335612.0000000005710000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xf7ad:$x1: NanoCore.ClientPluginHost
  • 0xf7da:$x2: IClientNetworkHost
00000008.00000002.494335612.0000000005710000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xf7ad:$x2: NanoCore.ClientPluginHost
  • 0x10888:$s4: PipeCreated
  • 0xf7c7:$s5: IClientLoggingHost
00000008.00000002.494335612.0000000005710000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000008.00000002.483906093.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000008.00000002.483906093.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 20 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      8.2.RegSvcs.exe.3bcec9e.5.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x4083:$x1: NanoCore.ClientPluginHost
      8.2.RegSvcs.exe.3bcec9e.5.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0x4083:$x2: NanoCore.ClientPluginHost
      • 0x4161:$s4: PipeCreated
      • 0x409d:$s5: IClientLoggingHost
      8.2.RegSvcs.exe.2b91488.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x40c2:$x1: NanoCore.ClientPluginHost
      8.2.RegSvcs.exe.2b91488.3.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0x40c2:$x2: NanoCore.ClientPluginHost
      • 0x41a0:$s4: PipeCreated
      • 0x40dc:$s5: IClientLoggingHost
      8.2.RegSvcs.exe.5700000.9.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1646:$x1: NanoCore.ClientPluginHost
      Click to see the 42 entries

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 5464, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Sigma detected: Scheduled temp file as task from temp locationShow sources
      Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LbSNAHQmeXYAoG' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EF2.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LbSNAHQmeXYAoG' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EF2.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\Y5XyMnx8Ng.exe' , ParentImage: C:\Users\user\Desktop\Y5XyMnx8Ng.exe, ParentProcessId: 6372, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LbSNAHQmeXYAoG' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EF2.tmp', ProcessId: 5812

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000008.00000002.492975177.0000000003BBB000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "572eb7a9-aedf-4b39-8669-f7563dab8a38", "Group": "GREAT", "Domain1": "strongodss.ddns.net", "Domain2": "79.134.225.43", "Port": 58103, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Enable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8009, "BufferSize": "02000100", "MaxPacketSize": "", "GCThreshold": "", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\LbSNAHQmeXYAoG.exeReversingLabs: Detection: 38%
      Multi AV Scanner detection for submitted fileShow sources
      Source: Y5XyMnx8Ng.exeVirustotal: Detection: 25%Perma Link
      Source: Y5XyMnx8Ng.exeReversingLabs: Detection: 38%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000008.00000002.494335612.0000000005710000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.483906093.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.273575013.0000000003C11000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.274362960.00000000040F1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.492975177.0000000003BBB000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5464, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Y5XyMnx8Ng.exe PID: 6372, type: MEMORY
      Source: Yara matchFile source: 8.2.RegSvcs.exe.5710000.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.5710000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bd9511.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.5714629.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bd9511.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bcec9e.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bd3adb.4.raw.unpack, type: UNPACKEDPE
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\LbSNAHQmeXYAoG.exeJoe Sandbox ML: detected
      Machine Learning detection for sampleShow sources
      Source: Y5XyMnx8Ng.exeJoe Sandbox ML: detected
      Source: 8.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 8.2.RegSvcs.exe.5710000.11.unpackAvira: Label: TR/NanoCore.fadte

      Compliance:

      barindex
      Uses 32bit PE filesShow sources
      Source: Y5XyMnx8Ng.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Uses new MSVCR DllsShow sources
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
      Source: Y5XyMnx8Ng.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Binary contains paths to debug symbolsShow sources
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: RegSvcs.exe, 00000008.00000002.490972657.0000000002B81000.00000004.00000001.sdmp
      Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.pdb source: RegSvcs.exe, 00000008.00000002.487808964.0000000002665000.00000004.00000040.sdmp
      Source: Binary string: System.EnterpriseServices.Wrapper.pdb source: dhcpmon.exe, 00000019.00000002.302260092.0000000005140000.00000002.00000001.sdmp
      Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: RegSvcs.exe, 00000008.00000002.487808964.0000000002665000.00000004.00000040.sdmp
      Source: Binary string: indows\RegSvcs.pdbpdbvcs.pdb source: RegSvcs.exe, 00000008.00000002.487808964.0000000002665000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000008.00000002.487808964.0000000002665000.00000004.00000040.sdmp
      Source: Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe.8.dr
      Source: Binary string: mscorrc.pdb source: Y5XyMnx8Ng.exe, 00000000.00000002.278970967.0000000006DC0000.00000002.00000001.sdmp, RegSvcs.exe, 00000008.00000002.494053967.0000000005420000.00000002.00000001.sdmp, RegSvcs.exe, 0000000D.00000002.281231117.0000000005260000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.284297730.00000000051F0000.00000002.00000001.sdmp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 4x nop then mov esp, ebp

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: 79.134.225.43
      Source: Malware configuration extractorURLs: strongodss.ddns.net
      Connects to many ports of the same IP (likely port scanning)Show sources
      Source: global trafficTCP traffic: 79.134.225.43 ports 0,1,3,58103,5,8
      Source: global trafficTCP traffic: 87.237.165.78 ports 0,1,3,58103,5,8
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: strongodss.ddns.net
      Source: global trafficTCP traffic: 192.168.2.3:49721 -> 87.237.165.78:58103
      Source: global trafficTCP traffic: 192.168.2.3:49726 -> 79.134.225.43:58103
      Source: Joe Sandbox ViewIP Address: 79.134.225.43 79.134.225.43
      Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
      Source: unknownDNS traffic detected: queries for: strongodss.ddns.net
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.221812778.0000000004FD9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.co
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222347558.0000000004FAF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com.TTFt
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmp, Y5XyMnx8Ng.exe, 00000000.00000003.222322158.0000000004FD9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.221812778.0000000004FD9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers$
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.220682724.0000000004FD9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222028980.0000000004FAC000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222028980.0000000004FAC000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlo
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmp, Y5XyMnx8Ng.exe, 00000000.00000003.221423345.0000000004FD9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.221561815.0000000004FAF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html.
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.221121855.0000000004FD9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers2
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.230809390.0000000004FD9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers9
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.221121855.0000000004FD9000.00000004.00000001.sdmp, Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.221047138.0000000004FD9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersP
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222477602.0000000004FD9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersb
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.230715828.0000000004FD9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersi
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.220778598.0000000004FD9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersp
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222028980.0000000004FAC000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222347558.0000000004FAF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comJVR
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222528263.0000000004FAE000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comTTFd
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.274744752.0000000004FAA000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comafV
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222347558.0000000004FAF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalsdpV
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.221561815.0000000004FAF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comd
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.221561815.0000000004FAF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdaJVR
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.221561815.0000000004FAF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdoVu
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222028980.0000000004FAC000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdsed
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222347558.0000000004FAF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comm
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222347558.0000000004FAF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comoVu
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222347558.0000000004FAF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comoitu
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222028980.0000000004FAC000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comtu9
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.217090225.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.216885369.0000000004FDF000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/u9
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.216954032.0000000004FD9000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/u:
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.225264485.0000000004FD9000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.226090976.0000000004FBA000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm:
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.225264485.0000000004FD9000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmA
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmp, Y5XyMnx8Ng.exe, 00000000.00000003.218060578.0000000004FAD000.00000004.00000001.sdmp, Y5XyMnx8Ng.exe, 00000000.00000003.218561435.0000000004FA3000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.218060578.0000000004FAD000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/)
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.218142700.0000000004FAD000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/3VY
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.218561435.0000000004FA3000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/8V
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.218171595.0000000004FA8000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/JVR
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.218561435.0000000004FA3000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.218060578.0000000004FAD000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ch
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.218561435.0000000004FA3000.00000004.00000001.sdmp, Y5XyMnx8Ng.exe, 00000000.00000003.218681710.0000000004FAC000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.218060578.0000000004FAD000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/nly
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.218060578.0000000004FAD000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/nt
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.217807198.0000000004FA3000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/oVu
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.218171595.0000000004FA8000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/s
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.216954032.0000000004FD9000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.como
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222528263.0000000004FAE000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222528263.0000000004FAE000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de.h
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222528263.0000000004FAE000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deF
      Source: Y5XyMnx8Ng.exe, 00000000.00000003.222528263.0000000004FAE000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.delarKh
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: dhcpmon.exe, 0000000F.00000002.282991349.0000000000F08000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
      Source: RegSvcs.exe, 00000008.00000002.494335612.0000000005710000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000008.00000002.494335612.0000000005710000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.483906093.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.273575013.0000000003C11000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.274362960.00000000040F1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.492975177.0000000003BBB000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5464, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Y5XyMnx8Ng.exe PID: 6372, type: MEMORY
      Source: Yara matchFile source: 8.2.RegSvcs.exe.5710000.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.5710000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bd9511.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.5714629.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bd9511.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bcec9e.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bd3adb.4.raw.unpack, type: UNPACKEDPE

      Operating System Destruction:

      barindex
      Protects its processes via BreakOnTermination flagShow sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: 01 00 00 00

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000008.00000002.494335612.0000000005710000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000008.00000002.483906093.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000008.00000002.483906093.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.273575013.0000000003C11000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.273575013.0000000003C11000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.274362960.00000000040F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.274362960.00000000040F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000008.00000002.492975177.0000000003BBB000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000008.00000002.494301167.0000000005700000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000008.00000002.493799082.0000000004E80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: RegSvcs.exe PID: 5464, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: RegSvcs.exe PID: 5464, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: Y5XyMnx8Ng.exe PID: 6372, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: Y5XyMnx8Ng.exe PID: 6372, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RegSvcs.exe.3bcec9e.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RegSvcs.exe.2b91488.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RegSvcs.exe.5700000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RegSvcs.exe.5710000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RegSvcs.exe.4e80000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RegSvcs.exe.5710000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RegSvcs.exe.2b96304.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RegSvcs.exe.3bd9511.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RegSvcs.exe.5714629.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RegSvcs.exe.3bd9511.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RegSvcs.exe.3bcec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RegSvcs.exe.3bcec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RegSvcs.exe.3bd3adb.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RegSvcs.exe.3bd3adb.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RegSvcs.exe.2b91488.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_070C2A9E NtQuerySystemInformation,
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_070C2A6D NtQuerySystemInformation,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_02721836 NtQuerySystemInformation,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_02721572 NtSetInformationProcess,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_02721541 NtSetInformationProcess,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_027217FB NtQuerySystemInformation,
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_04D98C28
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_04D92398
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_04D930D1
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_04D98CCE
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_04D930E0
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_04D98C17
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_04D94DDF
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_04D92389
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_04D9331B
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_067C54C9
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_067C3B27
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_04D90110
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_04D90100
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00C37AC1
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_026C9A68
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_026C8E68
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_026C2FA8
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_026C23A0
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_026C3970
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_026C9B2F
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_026CB738
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_026CA310
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_026C306F
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.279706744.00000000076E0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs Y5XyMnx8Ng.exe
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.268326275.00000000005F4000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamev, vs Y5XyMnx8Ng.exe
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.273755283.0000000003D55000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAssemblyReferenceEntry.exeD vs Y5XyMnx8Ng.exe
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.279114179.0000000006EC0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs Y5XyMnx8Ng.exe
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.279913440.00000000077D0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs Y5XyMnx8Ng.exe
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.279913440.00000000077D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs Y5XyMnx8Ng.exe
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.278970967.0000000006DC0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Y5XyMnx8Ng.exe
      Source: Y5XyMnx8Ng.exeBinary or memory string: OriginalFilenamev, vs Y5XyMnx8Ng.exe
      Source: Y5XyMnx8Ng.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 00000008.00000002.494335612.0000000005710000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000008.00000002.494335612.0000000005710000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000008.00000002.483906093.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000008.00000002.483906093.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.273575013.0000000003C11000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.273575013.0000000003C11000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.274362960.00000000040F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.274362960.00000000040F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000008.00000002.492975177.0000000003BBB000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000008.00000002.494301167.0000000005700000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000008.00000002.494301167.0000000005700000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000008.00000002.493799082.0000000004E80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000008.00000002.493799082.0000000004E80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: Process Memory Space: RegSvcs.exe PID: 5464, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: RegSvcs.exe PID: 5464, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: Y5XyMnx8Ng.exe PID: 6372, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: Y5XyMnx8Ng.exe PID: 6372, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RegSvcs.exe.3bcec9e.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RegSvcs.exe.3bcec9e.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RegSvcs.exe.2b91488.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RegSvcs.exe.2b91488.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RegSvcs.exe.5700000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RegSvcs.exe.5700000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RegSvcs.exe.5710000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RegSvcs.exe.5710000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RegSvcs.exe.4e80000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RegSvcs.exe.4e80000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RegSvcs.exe.5710000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RegSvcs.exe.5710000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RegSvcs.exe.2b96304.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RegSvcs.exe.2b96304.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RegSvcs.exe.3bd9511.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RegSvcs.exe.3bd9511.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RegSvcs.exe.5714629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RegSvcs.exe.5714629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RegSvcs.exe.3bd9511.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RegSvcs.exe.3bd9511.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RegSvcs.exe.3bcec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RegSvcs.exe.3bcec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RegSvcs.exe.3bcec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RegSvcs.exe.3bd3adb.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RegSvcs.exe.3bd3adb.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RegSvcs.exe.3bd3adb.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RegSvcs.exe.2b91488.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RegSvcs.exe.2b91488.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: Y5XyMnx8Ng.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: LbSNAHQmeXYAoG.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: 8.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 8.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 8.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: classification engineClassification label: mal100.troj.evad.winEXE@18/13@11/2
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_070C2922 AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_070C28EB AdjustTokenPrivileges,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_027213F6 AdjustTokenPrivileges,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_027213BF AdjustTokenPrivileges,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeFile created: C:\Users\user\AppData\Roaming\LbSNAHQmeXYAoG.exeJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6036:120:WilError_01
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeMutant created: \Sessions\1\BaseNamedObjects\qAuJsXfdqbt
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1968:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3180:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5828:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2172:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5680:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{572eb7a9-aedf-4b39-8669-f7563dab8a38}
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8EF2.tmpJump to behavior
      Source: Y5XyMnx8Ng.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: Y5XyMnx8Ng.exeVirustotal: Detection: 25%
      Source: Y5XyMnx8Ng.exeReversingLabs: Detection: 38%
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeFile read: C:\Users\user\Desktop\Y5XyMnx8Ng.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\Y5XyMnx8Ng.exe 'C:\Users\user\Desktop\Y5XyMnx8Ng.exe'
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LbSNAHQmeXYAoG' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EF2.tmp'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe {path}
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp3911.tmp'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp3C8D.tmp'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LbSNAHQmeXYAoG' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EF2.tmp'
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe {path}
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp3911.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp3C8D.tmp'
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: Y5XyMnx8Ng.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: Y5XyMnx8Ng.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: RegSvcs.exe, 00000008.00000002.490972657.0000000002B81000.00000004.00000001.sdmp
      Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.pdb source: RegSvcs.exe, 00000008.00000002.487808964.0000000002665000.00000004.00000040.sdmp
      Source: Binary string: System.EnterpriseServices.Wrapper.pdb source: dhcpmon.exe, 00000019.00000002.302260092.0000000005140000.00000002.00000001.sdmp
      Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: RegSvcs.exe, 00000008.00000002.487808964.0000000002665000.00000004.00000040.sdmp
      Source: Binary string: indows\RegSvcs.pdbpdbvcs.pdb source: RegSvcs.exe, 00000008.00000002.487808964.0000000002665000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000008.00000002.487808964.0000000002665000.00000004.00000040.sdmp
      Source: Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe.8.dr
      Source: Binary string: mscorrc.pdb source: Y5XyMnx8Ng.exe, 00000000.00000002.278970967.0000000006DC0000.00000002.00000001.sdmp, RegSvcs.exe, 00000008.00000002.494053967.0000000005420000.00000002.00000001.sdmp, RegSvcs.exe, 0000000D.00000002.281231117.0000000005260000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.284297730.00000000051F0000.00000002.00000001.sdmp

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: Y5XyMnx8Ng.exe, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: LbSNAHQmeXYAoG.exe.0.dr, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.0.Y5XyMnx8Ng.exe.530000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.2.Y5XyMnx8Ng.exe.530000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 8.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 8.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_04D96A11 push ds; retf
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_067C31AB push es; ret
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00C3CAC0 pushfd ; ret
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00C3CB68 pushfd ; ret
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00C3CB78 pushfd ; ret
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00C3CB28 pushfd ; ret
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00C3ADA8 push cs; retf
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00C39D74 push 7800C3CBh; retf
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00C3AD34 push cs; retf
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00C3AE1B push cs; retf
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00C39E18 push 9E4400F2h; ret
      Source: initial sampleStatic PE information: section name: .text entropy: 7.94843846597
      Source: initial sampleStatic PE information: section name: .text entropy: 7.94843846597
      Source: 8.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 8.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeFile created: C:\Users\user\AppData\Roaming\LbSNAHQmeXYAoG.exeJump to dropped file

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LbSNAHQmeXYAoG' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EF2.tmp'

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Yara detected AntiVM_3Show sources
      Source: Yara matchFile source: Process Memory Space: Y5XyMnx8Ng.exe PID: 6372, type: MEMORY
      Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)Show sources
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.270288505.0000000002C11000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME<
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.270288505.0000000002C11000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.271289539.0000000003185000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum name: 0
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: foregroundWindowGot 748
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exe TID: 6400Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6464Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2344Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_0272161A GetSystemInfo,
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.270288505.0000000002C11000.00000004.00000001.sdmpBinary or memory string: kr#"SOFTWARE\VMware, Inc.\VMware Tools<
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.271289539.0000000003185000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II<
      Source: RegSvcs.exe, 00000008.00000002.494961160.0000000005FD0000.00000002.00000001.sdmp, RegSvcs.exe, 0000000D.00000002.281641062.00000000052C0000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.284382168.0000000005250000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.270288505.0000000002C11000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.270288505.0000000002C11000.00000004.00000001.sdmpBinary or memory string: kr&%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\<
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.270288505.0000000002C11000.00000004.00000001.sdmpBinary or memory string: krA"SOFTWARE\VMware, Inc.\VMware Tools
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.270288505.0000000002C11000.00000004.00000001.sdmpBinary or memory string: kr%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.271289539.0000000003185000.00000004.00000001.sdmpBinary or memory string: VMWARE<
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.270288505.0000000002C11000.00000004.00000001.sdmpBinary or memory string: kr87HKEY_LOCAL_MACHINE\SOFTWARE\VMware, Inc.\VMware Tools\.
      Source: RegSvcs.exe, 00000008.00000002.485437819.0000000000928000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.271289539.0000000003185000.00000004.00000001.sdmpBinary or memory string: VMWARE
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.270288505.0000000002C11000.00000004.00000001.sdmpBinary or memory string: kr"SOFTWARE\VMware, Inc.\VMware Tools
      Source: RegSvcs.exe, 00000008.00000002.485704154.0000000000959000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll'
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.270288505.0000000002C11000.00000004.00000001.sdmpBinary or memory string: QEMU<
      Source: RegSvcs.exe, 00000008.00000002.494961160.0000000005FD0000.00000002.00000001.sdmp, RegSvcs.exe, 0000000D.00000002.281641062.00000000052C0000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.284382168.0000000005250000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: RegSvcs.exe, 00000008.00000002.494961160.0000000005FD0000.00000002.00000001.sdmp, RegSvcs.exe, 0000000D.00000002.281641062.00000000052C0000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.284382168.0000000005250000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.271289539.0000000003185000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.270288505.0000000002C11000.00000004.00000001.sdmpBinary or memory string: kr#"SOFTWARE\VMware, Inc.\VMware ToolsH
      Source: RegSvcs.exe, 00000008.00000002.494961160.0000000005FD0000.00000002.00000001.sdmp, RegSvcs.exe, 0000000D.00000002.281641062.00000000052C0000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.284382168.0000000005250000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Allocates memory in foreign processesShow sources
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 protect: page execute and read and write
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 value starts with: 4D5A
      Writes to foreign memory regionsShow sources
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 402000
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 420000
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 422000
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 6FC008
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LbSNAHQmeXYAoG' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EF2.tmp'
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe {path}
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp3911.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp3C8D.tmp'
      Source: RegSvcs.exe, 00000008.00000002.485437819.0000000000928000.00000004.00000020.sdmpBinary or memory string: Program Manager (x86)\DHCP Monitor\dhcpmon.exegSvcs.exe
      Source: RegSvcs.exe, 00000008.00000002.492739877.0000000002DDA000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: RegSvcs.exe, 00000008.00000002.487561869.0000000001140000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: RegSvcs.exe, 00000008.00000002.487561869.0000000001140000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: RegSvcs.exe, 00000008.00000002.487561869.0000000001140000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Users\user\Desktop\Y5XyMnx8Ng.exeCode function: 0_2_070C0FF2 GetUserNameA,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000008.00000002.494335612.0000000005710000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.483906093.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.273575013.0000000003C11000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.274362960.00000000040F1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.492975177.0000000003BBB000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5464, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Y5XyMnx8Ng.exe PID: 6372, type: MEMORY
      Source: Yara matchFile source: 8.2.RegSvcs.exe.5710000.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.5710000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bd9511.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.5714629.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bd9511.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bcec9e.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bd3adb.4.raw.unpack, type: UNPACKEDPE

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: Y5XyMnx8Ng.exe, 00000000.00000002.274362960.00000000040F1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RegSvcs.exe, 00000008.00000002.490972657.0000000002B81000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RegSvcs.exe, 00000008.00000002.490972657.0000000002B81000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: RegSvcs.exe, 00000008.00000002.490972657.0000000002B81000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000008.00000002.494335612.0000000005710000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.483906093.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.273575013.0000000003C11000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.274362960.00000000040F1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.492975177.0000000003BBB000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5464, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Y5XyMnx8Ng.exe PID: 6372, type: MEMORY
      Source: Yara matchFile source: 8.2.RegSvcs.exe.5710000.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.5710000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bd9511.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.5714629.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bd9511.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Y5XyMnx8Ng.exe.4125e60.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bcec9e.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RegSvcs.exe.3bd3adb.4.raw.unpack, type: UNPACKEDPE
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_02722B26 bind,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_02722AF6 bind,

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Access Token Manipulation1Disable or Modify Tools1Input Capture21Account Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsProcess Injection312Deobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture21Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Obfuscated Files or Information3Security Account ManagerSystem Information Discovery13SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing13NTDSSecurity Software Discovery311Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading2LSA SecretsVirtualization/Sandbox Evasion13SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion13Cached Domain CredentialsProcess Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection312Proc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 357424 Sample: Y5XyMnx8Ng.exe Startdate: 24/02/2021 Architecture: WINDOWS Score: 100 52 strongodss.ddns.net 2->52 58 Found malware configuration 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 Multi AV Scanner detection for dropped file 2->62 64 14 other signatures 2->64 9 Y5XyMnx8Ng.exe 6 2->9         started        13 RegSvcs.exe 4 2->13         started        15 dhcpmon.exe 4 2->15         started        17 dhcpmon.exe 3 2->17         started        signatures3 process4 file5 46 C:\Users\user\AppData\...\LbSNAHQmeXYAoG.exe, PE32 9->46 dropped 48 C:\Users\user\AppData\Local\...\tmp8EF2.tmp, XML 9->48 dropped 50 C:\Users\user\AppData\...\Y5XyMnx8Ng.exe.log, ASCII 9->50 dropped 70 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 9->70 72 Writes to foreign memory regions 9->72 74 Allocates memory in foreign processes 9->74 76 Injects a PE file into a foreign processes 9->76 19 RegSvcs.exe 1 13 9->19         started        24 schtasks.exe 1 9->24         started        26 conhost.exe 13->26         started        28 conhost.exe 15->28         started        30 conhost.exe 17->30         started        signatures6 process7 dnsIp8 54 strongodss.ddns.net 87.237.165.78, 49721, 49724, 49725 MTVHGB Russian Federation 19->54 56 79.134.225.43, 49726, 49728, 49729 FINK-TELECOM-SERVICESCH Switzerland 19->56 42 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 19->42 dropped 44 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->44 dropped 66 Protects its processes via BreakOnTermination flag 19->66 68 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->68 32 schtasks.exe 1 19->32         started        34 schtasks.exe 1 19->34         started        36 conhost.exe 24->36         started        file9 signatures10 process11 process12 38 conhost.exe 32->38         started        40 conhost.exe 34->40         started       

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      Y5XyMnx8Ng.exe25%VirustotalBrowse
      Y5XyMnx8Ng.exe38%ReversingLabsWin32.Trojan.Wacatac
      Y5XyMnx8Ng.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\LbSNAHQmeXYAoG.exe100%Joe Sandbox ML
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs
      C:\Users\user\AppData\Roaming\LbSNAHQmeXYAoG.exe38%ReversingLabsWin32.Trojan.Wacatac

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      8.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      8.2.RegSvcs.exe.5710000.11.unpack100%AviraTR/NanoCore.fadteDownload File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://www.galapagosdesign.com/staff/dennis.htm:0%Avira URL Cloudsafe
      79.134.225.430%Avira URL Cloudsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.urwpp.de.h0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/staff/dennis.htmA0%Avira URL Cloudsafe
      http://www.fontbureau.comtu90%Avira URL Cloudsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.fontbureau.comafV0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/8V0%Avira URL Cloudsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/ch0%Avira URL Cloudsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.fontbureau.com.TTFt0%Avira URL Cloudsafe
      http://www.urwpp.delarKh0%Avira URL Cloudsafe
      http://www.fontbureau.comdoVu0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/)0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
      http://www.fontbureau.comalsdpV0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn/u:0%Avira URL Cloudsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.founder.com.cn/cn/u90%Avira URL Cloudsafe
      http://www.urwpp.de0%URL Reputationsafe
      http://www.urwpp.de0%URL Reputationsafe
      http://www.urwpp.de0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.galapagosdesign.com/0%URL Reputationsafe
      http://www.galapagosdesign.com/0%URL Reputationsafe
      http://www.galapagosdesign.com/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/nt0%Avira URL Cloudsafe
      http://www.fontbureau.comF0%URL Reputationsafe
      http://www.fontbureau.comF0%URL Reputationsafe
      http://www.fontbureau.comF0%URL Reputationsafe
      http://www.tiro.como0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/3VY0%Avira URL Cloudsafe
      http://www.fontbureau.co0%Avira URL Cloudsafe
      http://www.urwpp.deF0%Avira URL Cloudsafe
      http://www.fontbureau.comJVR0%Avira URL Cloudsafe
      http://www.fontbureau.comdaJVR0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
      http://www.fontbureau.comTTFd0%Avira URL Cloudsafe
      http://www.fontbureau.comd0%URL Reputationsafe
      http://www.fontbureau.comd0%URL Reputationsafe
      http://www.fontbureau.comd0%URL Reputationsafe
      strongodss.ddns.net0%Avira URL Cloudsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.fontbureau.comoVu0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn/0%URL Reputationsafe
      http://www.founder.com.cn/cn/0%URL Reputationsafe
      http://www.founder.com.cn/cn/0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.fontbureau.comoitu0%URL Reputationsafe
      http://www.fontbureau.comoitu0%URL Reputationsafe
      http://www.fontbureau.comoitu0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/oVu0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/s0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/s0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/s0%URL Reputationsafe
      http://www.fontbureau.comm0%URL Reputationsafe
      http://www.fontbureau.comm0%URL Reputationsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      strongodss.ddns.net
      87.237.165.78
      truetrue
        unknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        79.134.225.43true
        • Avira URL Cloud: safe
        unknown
        strongodss.ddns.nettrue
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.galapagosdesign.com/staff/dennis.htm:Y5XyMnx8Ng.exe, 00000000.00000003.226090976.0000000004FBA000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designersGY5XyMnx8Ng.exe, 00000000.00000003.221121855.0000000004FD9000.00000004.00000001.sdmp, Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
          high
          http://www.fontbureau.com/designers/?Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
            high
            http://www.founder.com.cn/cn/bTheY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.urwpp.de.hY5XyMnx8Ng.exe, 00000000.00000003.222528263.0000000004FAE000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.galapagosdesign.com/staff/dennis.htmAY5XyMnx8Ng.exe, 00000000.00000003.225264485.0000000004FD9000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designers?Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
              high
              http://www.fontbureau.comtu9Y5XyMnx8Ng.exe, 00000000.00000003.222028980.0000000004FAC000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designers/frere-jones.html.Y5XyMnx8Ng.exe, 00000000.00000003.221561815.0000000004FAF000.00000004.00000001.sdmpfalse
                high
                http://www.tiro.comY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designersY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmp, Y5XyMnx8Ng.exe, 00000000.00000003.222322158.0000000004FD9000.00000004.00000001.sdmpfalse
                  high
                  http://www.goodfont.co.krY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designersPY5XyMnx8Ng.exe, 00000000.00000003.221047138.0000000004FD9000.00000004.00000001.sdmpfalse
                    high
                    http://www.fontbureau.comafVY5XyMnx8Ng.exe, 00000000.00000002.274744752.0000000004FAA000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/8VY5XyMnx8Ng.exe, 00000000.00000003.218561435.0000000004FA3000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.sajatypeworks.comY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersiY5XyMnx8Ng.exe, 00000000.00000003.230715828.0000000004FD9000.00000004.00000001.sdmpfalse
                      high
                      http://www.typography.netDY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/cTheY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/chY5XyMnx8Ng.exe, 00000000.00000003.218060578.0000000004FAD000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://fontfabrik.comY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com.TTFtY5XyMnx8Ng.exe, 00000000.00000003.222347558.0000000004FAF000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.urwpp.delarKhY5XyMnx8Ng.exe, 00000000.00000003.222528263.0000000004FAE000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designersbY5XyMnx8Ng.exe, 00000000.00000003.222477602.0000000004FD9000.00000004.00000001.sdmpfalse
                        high
                        http://www.fontbureau.comdoVuY5XyMnx8Ng.exe, 00000000.00000003.221561815.0000000004FAF000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.galapagosdesign.com/DPleaseY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/)Y5XyMnx8Ng.exe, 00000000.00000003.218060578.0000000004FAD000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/Y0Y5XyMnx8Ng.exe, 00000000.00000003.218561435.0000000004FA3000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comalsdpVY5XyMnx8Ng.exe, 00000000.00000003.222347558.0000000004FAF000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fonts.comY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/u:Y5XyMnx8Ng.exe, 00000000.00000003.216954032.0000000004FD9000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.sandoll.co.krY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.deDPleaseY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cn/u9Y5XyMnx8Ng.exe, 00000000.00000003.216885369.0000000004FDF000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.urwpp.deY5XyMnx8Ng.exe, 00000000.00000003.222528263.0000000004FAE000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cnY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designerspY5XyMnx8Ng.exe, 00000000.00000003.220778598.0000000004FD9000.00000004.00000001.sdmpfalse
                            high
                            http://www.sakkal.comY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.apache.org/licenses/LICENSE-2.0Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                              high
                              http://www.fontbureau.comY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                                high
                                http://www.galapagosdesign.com/Y5XyMnx8Ng.exe, 00000000.00000003.225264485.0000000004FD9000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/ntY5XyMnx8Ng.exe, 00000000.00000003.218060578.0000000004FAD000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.comFY5XyMnx8Ng.exe, 00000000.00000003.222028980.0000000004FAC000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmloY5XyMnx8Ng.exe, 00000000.00000003.222028980.0000000004FAC000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.tiro.comoY5XyMnx8Ng.exe, 00000000.00000003.216954032.0000000004FD9000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/3VYY5XyMnx8Ng.exe, 00000000.00000003.218142700.0000000004FAD000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.coY5XyMnx8Ng.exe, 00000000.00000003.221812778.0000000004FD9000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.urwpp.deFY5XyMnx8Ng.exe, 00000000.00000003.222528263.0000000004FAE000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.comJVRY5XyMnx8Ng.exe, 00000000.00000003.222347558.0000000004FAF000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.comdaJVRY5XyMnx8Ng.exe, 00000000.00000003.221561815.0000000004FAF000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/jp/Y5XyMnx8Ng.exe, 00000000.00000003.218561435.0000000004FA3000.00000004.00000001.sdmp, Y5XyMnx8Ng.exe, 00000000.00000003.218681710.0000000004FAC000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comTTFdY5XyMnx8Ng.exe, 00000000.00000003.222528263.0000000004FAE000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.comdY5XyMnx8Ng.exe, 00000000.00000003.221561815.0000000004FAF000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comlY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comoVuY5XyMnx8Ng.exe, 00000000.00000003.222347558.0000000004FAF000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.founder.com.cn/cn/Y5XyMnx8Ng.exe, 00000000.00000003.217090225.0000000004FE0000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/cabarga.htmlNY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cnY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/frere-jones.htmlY5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmp, Y5XyMnx8Ng.exe, 00000000.00000003.221423345.0000000004FD9000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.fontbureau.comoituY5XyMnx8Ng.exe, 00000000.00000003.222347558.0000000004FAF000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.jiyu-kobo.co.jp/oVuY5XyMnx8Ng.exe, 00000000.00000003.217807198.0000000004FA3000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.jiyu-kobo.co.jp/sY5XyMnx8Ng.exe, 00000000.00000003.218171595.0000000004FA8000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/cabarga.htmlY5XyMnx8Ng.exe, 00000000.00000003.222028980.0000000004FAC000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.fontbureau.com/designers$Y5XyMnx8Ng.exe, 00000000.00000003.221812778.0000000004FD9000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.fontbureau.commY5XyMnx8Ng.exe, 00000000.00000003.222347558.0000000004FAF000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmp, Y5XyMnx8Ng.exe, 00000000.00000003.218060578.0000000004FAD000.00000004.00000001.sdmp, Y5XyMnx8Ng.exe, 00000000.00000003.218561435.0000000004FA3000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers9Y5XyMnx8Ng.exe, 00000000.00000003.230809390.0000000004FD9000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.fontbureau.com/designers8Y5XyMnx8Ng.exe, 00000000.00000002.275100610.0000000005290000.00000002.00000001.sdmpfalse
                                              high
                                              http://www.fontbureau.comdsedY5XyMnx8Ng.exe, 00000000.00000003.222028980.0000000004FAC000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.jiyu-kobo.co.jp/nlyY5XyMnx8Ng.exe, 00000000.00000003.218060578.0000000004FAD000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fontbureau.com/designers/Y5XyMnx8Ng.exe, 00000000.00000003.220682724.0000000004FD9000.00000004.00000001.sdmpfalse
                                                high
                                                http://www.jiyu-kobo.co.jp/JVRY5XyMnx8Ng.exe, 00000000.00000003.218171595.0000000004FA8000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.fontbureau.com/designers2Y5XyMnx8Ng.exe, 00000000.00000003.221121855.0000000004FD9000.00000004.00000001.sdmpfalse
                                                  high

                                                  Contacted IPs

                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs

                                                  Public

                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  87.237.165.78
                                                  unknownRussian Federation
                                                  49967MTVHGBtrue
                                                  79.134.225.43
                                                  unknownSwitzerland
                                                  6775FINK-TELECOM-SERVICESCHtrue

                                                  General Information

                                                  Joe Sandbox Version:31.0.0 Emerald
                                                  Analysis ID:357424
                                                  Start date:24.02.2021
                                                  Start time:16:08:49
                                                  Joe Sandbox Product:CloudBasic
                                                  Overall analysis duration:0h 9m 50s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:light
                                                  Sample file name:Y5XyMnx8Ng.exe
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                  Number of analysed new started processes analysed:40
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • HDC enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Detection:MAL
                                                  Classification:mal100.troj.evad.winEXE@18/13@11/2
                                                  EGA Information:Failed
                                                  HDC Information:
                                                  • Successful, ratio: 2.1% (good quality ratio 1.5%)
                                                  • Quality average: 51.1%
                                                  • Quality standard deviation: 38%
                                                  HCA Information:
                                                  • Successful, ratio: 92%
                                                  • Number of executed functions: 0
                                                  • Number of non-executed functions: 0
                                                  Cookbook Comments:
                                                  • Adjust boot time
                                                  • Enable AMSI
                                                  • Found application associated with file extension: .exe
                                                  Warnings:
                                                  Show All
                                                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                                  • TCP Packets have been reduced to 100
                                                  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                                                  • Excluded IPs from analysis (whitelisted): 2.22.152.11, 52.147.198.201, 204.79.197.200, 13.107.21.200, 104.42.151.234, 13.88.21.125, 23.54.113.53, 23.54.113.104, 51.104.139.180, 23.0.174.187, 23.0.174.185, 51.11.168.160, 23.10.249.25, 23.10.249.26, 52.155.217.156, 20.54.26.129
                                                  • Excluded domains from analysis (whitelisted): storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, storeedgefd.xbetservices.akadns.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, storeedgefd.dsx.mp.microsoft.com, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, dual-a-0001.a-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, storeedgefd.dsx.mp.microsoft.com.edgekey.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, e16646.dscg.akamaiedge.net, skypedataprdcolwus16.cloudapp.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.

                                                  Simulations

                                                  Behavior and APIs

                                                  TimeTypeDescription
                                                  16:09:50API Interceptor1x Sleep call for process: Y5XyMnx8Ng.exe modified
                                                  16:10:10Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" s>$(Arg0)
                                                  16:10:11API Interceptor811x Sleep call for process: RegSvcs.exe modified
                                                  16:10:13Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                                  16:10:13AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe

                                                  Joe Sandbox View / Context

                                                  IPs

                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                  87.237.165.78YoWPu2BQzA9FeDd.exeGet hashmaliciousBrowse
                                                    M5QDAaK9yM.exeGet hashmaliciousBrowse
                                                      TdX45jQWjj.exeGet hashmaliciousBrowse
                                                        79.134.225.43YoWPu2BQzA9FeDd.exeGet hashmaliciousBrowse
                                                          TdX45jQWjj.exeGet hashmaliciousBrowse
                                                            JfRbEbUkpV39K4L.exeGet hashmaliciousBrowse
                                                              Dachser Consulta de cliente saliente no. 000150849 - SKBMT03082020-0012-IMG0149.exeGet hashmaliciousBrowse
                                                                290453721.xlsGet hashmaliciousBrowse
                                                                  nUo0FukkVO.xlsGet hashmaliciousBrowse

                                                                    Domains

                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                    strongodss.ddns.netYoWPu2BQzA9FeDd.exeGet hashmaliciousBrowse
                                                                    • 87.237.165.78
                                                                    M5QDAaK9yM.exeGet hashmaliciousBrowse
                                                                    • 87.237.165.78
                                                                    TdX45jQWjj.exeGet hashmaliciousBrowse
                                                                    • 87.237.165.78

                                                                    ASN

                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                    MTVHGBYoWPu2BQzA9FeDd.exeGet hashmaliciousBrowse
                                                                    • 87.237.165.78
                                                                    M5QDAaK9yM.exeGet hashmaliciousBrowse
                                                                    • 87.237.165.78
                                                                    TdX45jQWjj.exeGet hashmaliciousBrowse
                                                                    • 87.237.165.78
                                                                    QUOTATION 19 01 2021.exeGet hashmaliciousBrowse
                                                                    • 87.237.165.162
                                                                    FINK-TELECOM-SERVICESCHYoWPu2BQzA9FeDd.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.43
                                                                    xF7GogN7tM.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.120
                                                                    TZgGVyMJYF.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.74
                                                                    ilpbALnKbE.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.103
                                                                    Documents.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.87
                                                                    SWcNyi2YBj.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.103
                                                                    Confirmation Transfer Note Ref Number0002636.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.8
                                                                    TdX45jQWjj.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.43
                                                                    e92b274943f4a3a557881ee0dd57772d.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.105
                                                                    WxTm2cWLHF.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.71
                                                                    Payment Confirmation.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.30
                                                                    rjHlt1zz28.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.49
                                                                    Deadly Variants of Covid 19.docGet hashmaliciousBrowse
                                                                    • 79.134.225.49
                                                                    document.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.122
                                                                    5293ea9467ea45e928620a5ed74440f5.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.105
                                                                    f1a14e6352036833f1c109e1bb2934f2.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.105
                                                                    256ec8f8f67b59c5e085b0bb63afcd13.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.105
                                                                    JOIN.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.30
                                                                    Delivery pdf.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.25
                                                                    d88e07467ddcf9e3b19fa972b9f000d1.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.105

                                                                    JA3 Fingerprints

                                                                    No context

                                                                    Dropped Files

                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exereceipt.exeGet hashmaliciousBrowse
                                                                      YoWPu2BQzA9FeDd.exeGet hashmaliciousBrowse
                                                                        M5QDAaK9yM.exeGet hashmaliciousBrowse
                                                                          oMWv1Zof2y.exeGet hashmaliciousBrowse
                                                                            TdX45jQWjj.exeGet hashmaliciousBrowse
                                                                              QTxFuxF5NQ.exeGet hashmaliciousBrowse
                                                                                a34b93ef-dea2-45f8-a5bf-4f6b0b5291c7.exeGet hashmaliciousBrowse
                                                                                  3fcd8c19-af88-4cd9-87e7-0bfea1de01a1.exeGet hashmaliciousBrowse
                                                                                    Vietnam Order.exeGet hashmaliciousBrowse
                                                                                      Dhl Shipping Document.exeGet hashmaliciousBrowse
                                                                                        PO-WJO-001, pdf.exeGet hashmaliciousBrowse
                                                                                          byWuWAR5FD.exeGet hashmaliciousBrowse
                                                                                            parcel_images.exeGet hashmaliciousBrowse
                                                                                              0712020.exeGet hashmaliciousBrowse
                                                                                                JfRbEbUkpV39K4L.exeGet hashmaliciousBrowse
                                                                                                  DECEMBER QUOTATION REQUEST FOR FR12007POH0008_PO0000143_ETQ.exeGet hashmaliciousBrowse
                                                                                                    DECEMBER QUOTATION REQUEST FOR FR12007POH0008_PO0000143_ETQ.exeGet hashmaliciousBrowse
                                                                                                      zC3edqmNNt.exeGet hashmaliciousBrowse
                                                                                                        Shipping Document.pdf..exeGet hashmaliciousBrowse
                                                                                                          PPR & CPR_HEA_DECEMBER 4 2020.exeGet hashmaliciousBrowse

                                                                                                            Created / dropped Files

                                                                                                            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                            File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):32768
                                                                                                            Entropy (8bit):3.7515815714465193
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:384:BOj9Y8/gS7SDriLGKq1MHR5U4Ag6ihJSxUCR1rgCPKabK2t0X5P7DZ+JgWSW72uw:B+gSAdN1MH3HAFRJngW2u
                                                                                                            MD5:71369277D09DA0830C8C59F9E22BB23A
                                                                                                            SHA1:37F9781314F0F6B7E9CB529A573F2B1C8DE9E93F
                                                                                                            SHA-256:D4527B7AD2FC4778CC5BE8709C95AEA44EAC0568B367EE14F7357D72898C3698
                                                                                                            SHA-512:2F470383E3C796C4CF212EC280854DBB9E7E8C8010CE6857E58F8E7066D7516B7CD7039BC5C0F547E1F5C7F9F2287869ADFFB2869800B08B2982A88BE96E9FB7
                                                                                                            Malicious:false
                                                                                                            Antivirus:
                                                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                            Joe Sandbox View:
                                                                                                            • Filename: receipt.exe, Detection: malicious, Browse
                                                                                                            • Filename: YoWPu2BQzA9FeDd.exe, Detection: malicious, Browse
                                                                                                            • Filename: M5QDAaK9yM.exe, Detection: malicious, Browse
                                                                                                            • Filename: oMWv1Zof2y.exe, Detection: malicious, Browse
                                                                                                            • Filename: TdX45jQWjj.exe, Detection: malicious, Browse
                                                                                                            • Filename: QTxFuxF5NQ.exe, Detection: malicious, Browse
                                                                                                            • Filename: a34b93ef-dea2-45f8-a5bf-4f6b0b5291c7.exe, Detection: malicious, Browse
                                                                                                            • Filename: 3fcd8c19-af88-4cd9-87e7-0bfea1de01a1.exe, Detection: malicious, Browse
                                                                                                            • Filename: Vietnam Order.exe, Detection: malicious, Browse
                                                                                                            • Filename: Dhl Shipping Document.exe, Detection: malicious, Browse
                                                                                                            • Filename: PO-WJO-001, pdf.exe, Detection: malicious, Browse
                                                                                                            • Filename: byWuWAR5FD.exe, Detection: malicious, Browse
                                                                                                            • Filename: parcel_images.exe, Detection: malicious, Browse
                                                                                                            • Filename: 0712020.exe, Detection: malicious, Browse
                                                                                                            • Filename: JfRbEbUkpV39K4L.exe, Detection: malicious, Browse
                                                                                                            • Filename: DECEMBER QUOTATION REQUEST FOR FR12007POH0008_PO0000143_ETQ.exe, Detection: malicious, Browse
                                                                                                            • Filename: DECEMBER QUOTATION REQUEST FOR FR12007POH0008_PO0000143_ETQ.exe, Detection: malicious, Browse
                                                                                                            • Filename: zC3edqmNNt.exe, Detection: malicious, Browse
                                                                                                            • Filename: Shipping Document.pdf..exe, Detection: malicious, Browse
                                                                                                            • Filename: PPR & CPR_HEA_DECEMBER 4 2020.exe, Detection: malicious, Browse
                                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{Z.................P... .......k... ........@.. ...............................[....@..................................k..K................................... k............................................... ............... ..H............text....K... ...P.................. ..`.rsrc................`..............@..@.reloc...............p..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\RegSvcs.exe.log
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                            Category:modified
                                                                                                            Size (bytes):120
                                                                                                            Entropy (8bit):5.016405576253028
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:QHXMKaoWglAFXMWA2yTMGfsbNXLVd49Am12MFuAvOAsDeieVyn:Q3LawlAFXMWTyAGCFLIP12MUAvvrs
                                                                                                            MD5:50DEC1858E13F033E6DCA3CBFAD5E8DE
                                                                                                            SHA1:79AE1E9131B0FAF215B499D2F7B4C595AA120925
                                                                                                            SHA-256:14A557E226E3BA8620BB3A70035E1E316F1E9FB5C9E8F74C07110EE90B8D8AE4
                                                                                                            SHA-512:1BD73338DF685A5B57B0546E102ECFDEE65800410D6F77845E50456AC70DE72929088AF19B59647F01CBA7A5ACFB399C52D9EF2402A9451366586862EF88E7BF
                                                                                                            Malicious:false
                                                                                                            Preview: 1,"fusion","GAC",0..2,"System.EnterpriseServices, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Y5XyMnx8Ng.exe.log
                                                                                                            Process:C:\Users\user\Desktop\Y5XyMnx8Ng.exe
                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):655
                                                                                                            Entropy (8bit):5.273171405160065
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9t0U2WUXBQav:MLF20NaL329hJ5g522rWz2p29XBT
                                                                                                            MD5:2703120C370FBB4A8BA08C6D1754039E
                                                                                                            SHA1:EC0DB47BF00A4A828F796147619386C0BBEA66A1
                                                                                                            SHA-256:F95566974BC44F3A757CAFB1456D185D8F333AC84775089DE18310B90C18B1BC
                                                                                                            SHA-512:BC05A2A1BE5B122FC6D3DEA66EF4258522F13351B9754378395AAD019631E312CFD3BC990F3E3D5C7BB0BDBA1EAD54A2B34A96DEE2FCCD703721E98F6192ED48
                                                                                                            Malicious:true
                                                                                                            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\4de99804c29261edb63c93616550f034\System.Management.ni.dll",0..
                                                                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                                                                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                            Category:modified
                                                                                                            Size (bytes):120
                                                                                                            Entropy (8bit):5.016405576253028
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:QHXMKaoWglAFXMWA2yTMGfsbNXLVd49Am12MFuAvOAsDeieVyn:Q3LawlAFXMWTyAGCFLIP12MUAvvrs
                                                                                                            MD5:50DEC1858E13F033E6DCA3CBFAD5E8DE
                                                                                                            SHA1:79AE1E9131B0FAF215B499D2F7B4C595AA120925
                                                                                                            SHA-256:14A557E226E3BA8620BB3A70035E1E316F1E9FB5C9E8F74C07110EE90B8D8AE4
                                                                                                            SHA-512:1BD73338DF685A5B57B0546E102ECFDEE65800410D6F77845E50456AC70DE72929088AF19B59647F01CBA7A5ACFB399C52D9EF2402A9451366586862EF88E7BF
                                                                                                            Malicious:false
                                                                                                            Preview: 1,"fusion","GAC",0..2,"System.EnterpriseServices, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                                            C:\Users\user\AppData\Local\Temp\tmp3911.tmp
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1320
                                                                                                            Entropy (8bit):5.135021273392143
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mn4xtn:cbk4oL600QydbQxIYODOLedq3Z4j
                                                                                                            MD5:40B11EF601FB28F9B2E69D36857BF2EC
                                                                                                            SHA1:B6454020AD2CEED193F4792B77001D0BD741B370
                                                                                                            SHA-256:C51E12D18CC664425F6711D8AE2507068884C7057092CFA11884100E1E9D49E1
                                                                                                            SHA-512:E3C5BCC714CBFCA4B8058DDCDDF231DCEFA69C15881CE3F8123E59ED45CFB5DA052B56E1945DCF8DC7F800D62F9A4EECB82BCA69A66A1530787AEFFEB15E2BD5
                                                                                                            Malicious:false
                                                                                                            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                                            C:\Users\user\AppData\Local\Temp\tmp3C8D.tmp
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1310
                                                                                                            Entropy (8bit):5.109425792877704
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                                                                            MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                                                                            SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                                                                            SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                                                                            SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                                                                            Malicious:false
                                                                                                            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                                            C:\Users\user\AppData\Local\Temp\tmp8EF2.tmp
                                                                                                            Process:C:\Users\user\Desktop\Y5XyMnx8Ng.exe
                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1647
                                                                                                            Entropy (8bit):5.20290519634611
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBwtn:cbh47TlNQ//rydbz9I3YODOLNdq3k
                                                                                                            MD5:E61FE83EB8C07A1076C95D63A2E9C7E8
                                                                                                            SHA1:C45541423ECB8762EE2F8DAAF34BABA2E9932BE0
                                                                                                            SHA-256:8B817FAE8E4FD7B9A5D2604048DC837FE26167B6E8C58EA18F7EF3F43BA638CF
                                                                                                            SHA-512:C405B90523CDCB4624D47DDEF092321756983C3FD14472E1F74509A1CCDB670925B1F8179021CCB6FCBF4FF0848E713347F7D58CE94C888F545D961E627F7777
                                                                                                            Malicious:true
                                                                                                            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                            File Type:ISO-8859 text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):8
                                                                                                            Entropy (8bit):3.0
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:TuXt:U
                                                                                                            MD5:CF402C854B880FB79472DA48A88A3E43
                                                                                                            SHA1:C8A90AC6594C04B69F33AF27F72CE9A150C3203D
                                                                                                            SHA-256:8221288A0BD2019F58D6583BADF7C0E3C921078EB6D9C7F5A35FD39A40FC0699
                                                                                                            SHA-512:D135A204BCD0303455CF17FA1CA13880E47011B793F80263164DABAC29F95537C409263AA2A1E57D8C2862F083CA52D4608852D3F2E08D9D2142A7EB2A7451A2
                                                                                                            Malicious:true
                                                                                                            Preview: ..m.!..H
                                                                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):57
                                                                                                            Entropy (8bit):4.795707286467131
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:oMty8WbSX/MNn:oMLWus
                                                                                                            MD5:D685103573539B7E9FDBF5F1D7DD96CE
                                                                                                            SHA1:4B2FE6B5C0B37954B314FCAEE1F12237A9B02D07
                                                                                                            SHA-256:D78BC23B0CA3EDDF52D56AB85CDC30A71B3756569CB32AA2F6C28DBC23C76E8E
                                                                                                            SHA-512:17769A5944E8929323A34269ABEEF0861D5C6799B0A27F5545FBFADC80E5AB684A471AD6F6A7FC623002385154EA89DE94013051E09120AB94362E542AB0F1DD
                                                                                                            Malicious:false
                                                                                                            Preview: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                            C:\Users\user\AppData\Roaming\LbSNAHQmeXYAoG.exe
                                                                                                            Process:C:\Users\user\Desktop\Y5XyMnx8Ng.exe
                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):790016
                                                                                                            Entropy (8bit):7.9432068049127045
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:12288:wEd3LLUEMjhvUbJG16Kfd/b2ze6Mg5saYrwOnkG4WuCmcoevatwmWFoH8l/MM:3L0iG16KfdD6zsaykItmcoQatwmY8qr
                                                                                                            MD5:5BD6A6DBDA26ADA813C6F60FDFC7BA70
                                                                                                            SHA1:20D05385BE36213404CA178BF15E39D0587DD73F
                                                                                                            SHA-256:205F2EF71A4A099B8CAC6B0DF7BE7D04F5CA0C65E31FB1C00158F656CF2785C3
                                                                                                            SHA-512:DF3E138E62994C2E640EC4C2B4DDE795512D3D23ECFB49B932EED2DDC451A96447A9C9435E0C1E38D567B9523C02D906E20208DD49AC7D66C456701620362E28
                                                                                                            Malicious:true
                                                                                                            Antivirus:
                                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                            • Antivirus: ReversingLabs, Detection: 38%
                                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...4.5`..............0.............F"... ...@....@.. ....................................@..................................!..O....@.......................`....................................................... ............... ..H............text...L.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................("......H.......Ho...2......4...,...............................................&.(......*...0..9........~.........,".r...p.....(....o....s............~.....+..*....0...........~.....+..*".......*.0..!........(....r!..p~....o......t.....+..*....0..!........(....r1..p~....o......t.....+..*....0...........r5..p.+..*..0...........rA..p.+..*".(.....*^..}.....(.......(%....**...(.....*..0..;........rQ..pr...p.(...........,..(......+..s......o......( .....*..0..I........r...pr...p.(.......
                                                                                                            \Device\ConDrv
                                                                                                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1145
                                                                                                            Entropy (8bit):4.462201512373672
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:zKLXkzPDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0zPDQntKKH1MqJC
                                                                                                            MD5:46EBEB88876A00A52CC37B1F8E0D0438
                                                                                                            SHA1:5E5DB352F964E5F398301662FF558BD905798A65
                                                                                                            SHA-256:D65BD5A6CC112838AFE8FA70BF61FD13C1313BCE3EE3E76C50E454D7B581238B
                                                                                                            SHA-512:E713E6F304A469FB71235C598BC7E2C6F8458ABC61DAF3D1F364F66579CAFA4A7F3023E585BDA552FB400009E7805A8CA0311A50D5EDC9C2AD2D067772A071BE
                                                                                                            Malicious:false
                                                                                                            Preview: Microsoft (R) .NET Framework Services Installation Utility Version 2.0.50727.8922..Copyright (c) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output...

                                                                                                            Static File Info

                                                                                                            General

                                                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                            Entropy (8bit):7.9432068049127045
                                                                                                            TrID:
                                                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                            • DOS Executable Generic (2002/1) 0.01%
                                                                                                            File name:Y5XyMnx8Ng.exe
                                                                                                            File size:790016
                                                                                                            MD5:5bd6a6dbda26ada813c6f60fdfc7ba70
                                                                                                            SHA1:20d05385be36213404ca178bf15e39d0587dd73f
                                                                                                            SHA256:205f2ef71a4a099b8cac6b0df7be7d04f5ca0c65e31fb1c00158f656cf2785c3
                                                                                                            SHA512:df3e138e62994c2e640ec4c2b4dde795512d3d23ecfb49b932eed2ddc451a96447a9c9435e0c1e38d567b9523c02d906e20208dd49ac7d66c456701620362e28
                                                                                                            SSDEEP:12288:wEd3LLUEMjhvUbJG16Kfd/b2ze6Mg5saYrwOnkG4WuCmcoevatwmWFoH8l/MM:3L0iG16KfdD6zsaykItmcoQatwmY8qr
                                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...4.5`..............0.............F"... ...@....@.. ....................................@................................

                                                                                                            File Icon

                                                                                                            Icon Hash:00828e8e8686b000

                                                                                                            Static PE Info

                                                                                                            General

                                                                                                            Entrypoint:0x4c2246
                                                                                                            Entrypoint Section:.text
                                                                                                            Digitally signed:false
                                                                                                            Imagebase:0x400000
                                                                                                            Subsystem:windows gui
                                                                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                                            Time Stamp:0x6035AE34 [Wed Feb 24 01:39:00 2021 UTC]
                                                                                                            TLS Callbacks:
                                                                                                            CLR (.Net) Version:v2.0.50727
                                                                                                            OS Version Major:4
                                                                                                            OS Version Minor:0
                                                                                                            File Version Major:4
                                                                                                            File Version Minor:0
                                                                                                            Subsystem Version Major:4
                                                                                                            Subsystem Version Minor:0
                                                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                                            Entrypoint Preview

                                                                                                            Instruction
                                                                                                            jmp dword ptr [00402000h]
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al

                                                                                                            Data Directories

                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc21f40x4f.text
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x5b4.rsrc
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xc60000xc.reloc
                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                            Sections

                                                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                            .text0x20000xc024c0xc0400False0.935183680104data7.94843846597IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                            .rsrc0xc40000x5b40x600False0.431640625data4.21916130547IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                            .reloc0xc60000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                            Resources

                                                                                                            NameRVASizeTypeLanguageCountry
                                                                                                            RT_VERSION0xc40900x324data
                                                                                                            RT_MANIFEST0xc43c40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                                            Imports

                                                                                                            DLLImport
                                                                                                            mscoree.dll_CorExeMain

                                                                                                            Version Infos

                                                                                                            DescriptionData
                                                                                                            Translation0x0000 0x04b0
                                                                                                            LegalCopyrightCopyright 2016
                                                                                                            Assembly Version4.0.0.0
                                                                                                            InternalNamevSI.exe
                                                                                                            FileVersion4.0.0.0
                                                                                                            CompanyName
                                                                                                            LegalTrademarks
                                                                                                            Comments
                                                                                                            ProductNameITP_RMSS
                                                                                                            ProductVersion4.0.0.0
                                                                                                            FileDescriptionITP_RMSS
                                                                                                            OriginalFilenamevSI.exe

                                                                                                            Network Behavior

                                                                                                            Network Port Distribution

                                                                                                            TCP Packets

                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Feb 24, 2021 16:10:12.533143997 CET4972158103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:12.560343981 CET581034972187.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:13.123317957 CET4972158103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:13.150600910 CET581034972187.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:13.757090092 CET4972158103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:13.785631895 CET581034972187.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:19.076946020 CET4972458103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:19.107546091 CET581034972487.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:19.651211023 CET4972458103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:19.678690910 CET581034972487.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:20.257462025 CET4972458103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:20.284785032 CET581034972487.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:24.380441904 CET4972558103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:24.409280062 CET581034972587.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:25.047492027 CET4972558103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:25.074667931 CET581034972587.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:25.656824112 CET4972558103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:25.684272051 CET581034972587.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:29.727997065 CET4972658103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:10:29.760649920 CET581034972679.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:10:30.268054962 CET4972658103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:10:30.301914930 CET581034972679.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:10:30.813908100 CET4972658103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:10:30.846590996 CET581034972679.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:10:34.955918074 CET4972858103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:10:34.988707066 CET581034972879.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:10:35.579500914 CET4972858103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:10:35.612328053 CET581034972879.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:10:36.282670975 CET4972858103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:10:36.315766096 CET581034972879.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:10:40.331837893 CET4972958103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:10:40.364761114 CET581034972979.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:10:40.876931906 CET4972958103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:10:40.914079905 CET581034972979.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:10:41.423758984 CET4972958103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:10:41.456362009 CET581034972979.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:10:45.681472063 CET4973058103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:45.710315943 CET581034973087.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:46.221097946 CET4973058103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:46.248971939 CET581034973087.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:46.752454042 CET4973058103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:46.782939911 CET581034973087.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:50.995347977 CET4973158103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:51.022494078 CET581034973187.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:51.533984900 CET4973158103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:51.561500072 CET581034973187.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:52.065284967 CET4973158103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:52.093585014 CET581034973187.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:56.166809082 CET4973258103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:56.195791960 CET581034973287.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:56.706290960 CET4973258103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:56.736602068 CET581034973287.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:10:57.237741947 CET4973258103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:10:57.264682055 CET581034973287.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:11:01.270438910 CET4973958103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:11:01.303239107 CET581034973979.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:11:01.816044092 CET4973958103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:11:01.848630905 CET581034973979.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:11:02.362986088 CET4973958103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:11:02.396814108 CET581034973979.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:11:06.429452896 CET4974058103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:11:06.463603020 CET581034974079.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:11:06.972877026 CET4974058103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:11:07.007544994 CET581034974079.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:11:07.519614935 CET4974058103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:11:07.552390099 CET581034974079.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:11:11.568758011 CET4974658103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:11:11.601488113 CET581034974679.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:11:12.114870071 CET4974658103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:11:12.147849083 CET581034974679.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:11:12.662959099 CET4974658103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:11:12.696906090 CET581034974679.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:11:16.757277012 CET4974758103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:11:16.785811901 CET581034974787.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:11:17.302103043 CET4974758103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:11:17.331185102 CET581034974787.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:11:17.833460093 CET4974758103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:11:17.860521078 CET581034974787.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:11:21.924900055 CET4974858103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:11:21.952218056 CET581034974887.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:11:22.458440065 CET4974858103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:11:22.485619068 CET581034974887.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:11:22.989789009 CET4974858103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:11:23.018168926 CET581034974887.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:11:27.147738934 CET4975658103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:11:27.175889969 CET581034975687.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:11:27.677603006 CET4975658103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:11:27.705015898 CET581034975687.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:11:28.208844900 CET4975658103192.168.2.387.237.165.78
                                                                                                            Feb 24, 2021 16:11:28.237665892 CET581034975687.237.165.78192.168.2.3
                                                                                                            Feb 24, 2021 16:11:32.268532038 CET4976158103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:11:32.301124096 CET581034976179.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:11:32.803134918 CET4976158103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:11:32.835714102 CET581034976179.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:11:33.350023985 CET4976158103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:11:33.382822990 CET581034976179.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:11:37.758483887 CET4976258103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:11:37.791282892 CET581034976279.134.225.43192.168.2.3
                                                                                                            Feb 24, 2021 16:11:38.303525925 CET4976258103192.168.2.379.134.225.43
                                                                                                            Feb 24, 2021 16:11:38.336097002 CET581034976279.134.225.43192.168.2.3

                                                                                                            UDP Packets

                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Feb 24, 2021 16:09:34.962903023 CET5864353192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:35.001048088 CET53586438.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:35.563812017 CET6098553192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:35.576246977 CET53609858.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:35.645147085 CET5677753192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:35.657057047 CET53567778.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:36.236988068 CET5020053192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:36.249538898 CET53502008.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:37.237097979 CET5128153192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:37.249413013 CET53512818.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:38.251844883 CET4919953192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:38.264933109 CET53491998.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:38.662730932 CET5062053192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:38.680517912 CET53506208.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:39.442451954 CET6493853192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:39.455857038 CET53649388.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:40.795653105 CET6015253192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:40.808948040 CET53601528.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:41.904604912 CET5754453192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:41.919425964 CET53575448.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:43.047470093 CET5598453192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:43.059814930 CET53559848.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:44.306821108 CET6418553192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:44.319124937 CET53641858.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:45.135375977 CET6511053192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:45.148333073 CET53651108.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:48.856286049 CET5836153192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:48.868217945 CET53583618.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:53.001827002 CET6349253192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:53.044313908 CET53634928.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:54.032480955 CET6083153192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:54.046848059 CET53608318.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:54.677936077 CET6010053192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:54.690352917 CET53601008.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:55.502053022 CET5319553192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:55.514400005 CET53531958.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:09:56.381470919 CET5014153192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:09:56.393313885 CET53501418.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:10:02.328959942 CET5302353192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:10:02.341932058 CET53530238.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:10:04.517302036 CET4956353192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:10:04.529119968 CET53495638.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:10:06.100166082 CET5135253192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:10:06.112436056 CET53513528.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:10:06.430387020 CET5934953192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:10:06.448478937 CET53593498.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:10:12.494995117 CET5708453192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:10:12.515024900 CET53570848.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:10:17.301676989 CET5882353192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:10:17.313827038 CET53588238.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:10:19.046977043 CET5756853192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:10:19.069571018 CET53575688.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:10:24.355799913 CET5054053192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:10:24.378185987 CET53505408.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:10:31.779824018 CET5436653192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:10:31.798311949 CET53543668.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:10:45.665477037 CET5303453192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:10:45.679471970 CET53530348.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:10:50.969990969 CET5776253192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:10:50.982461929 CET53577628.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:10:56.150626898 CET5543553192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:10:56.164819956 CET53554358.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:00.175910950 CET5071353192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:00.188209057 CET53507138.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:10.023477077 CET5613253192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:10.036223888 CET53561328.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:16.742165089 CET5898753192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:16.755805969 CET53589878.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:21.909015894 CET5657953192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:21.921886921 CET53565798.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:24.093780994 CET6063353192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:24.106976032 CET53606338.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:24.641074896 CET6129253192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:24.653902054 CET53612928.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:25.124650955 CET6361953192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:25.137247086 CET53636198.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:25.476217985 CET6493853192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:25.488652945 CET53649388.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:25.934799910 CET6194653192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:25.942636967 CET6491053192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:25.955234051 CET53649108.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:25.967046022 CET53619468.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:26.422049999 CET5212353192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:26.435072899 CET53521238.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:27.133759022 CET5613053192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:27.143636942 CET5633853192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:27.146339893 CET53561308.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:27.158008099 CET53563388.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:27.831820011 CET5942053192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:27.844815969 CET53594208.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:28.594331026 CET5878453192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:28.609221935 CET53587848.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:29.027743101 CET6397853192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:29.042020082 CET53639788.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:48.078160048 CET6293853192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:48.098563910 CET53629388.8.8.8192.168.2.3
                                                                                                            Feb 24, 2021 16:11:53.198249102 CET5570853192.168.2.38.8.8.8
                                                                                                            Feb 24, 2021 16:11:53.212601900 CET53557088.8.8.8192.168.2.3

                                                                                                            DNS Queries

                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                            Feb 24, 2021 16:10:12.494995117 CET192.168.2.38.8.8.80x827bStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:10:19.046977043 CET192.168.2.38.8.8.80xb011Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:10:24.355799913 CET192.168.2.38.8.8.80x7a43Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:10:45.665477037 CET192.168.2.38.8.8.80x4f9Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:10:50.969990969 CET192.168.2.38.8.8.80x2628Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:10:56.150626898 CET192.168.2.38.8.8.80xe64dStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:11:16.742165089 CET192.168.2.38.8.8.80x9cbeStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:11:21.909015894 CET192.168.2.38.8.8.80x9e7dStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:11:27.133759022 CET192.168.2.38.8.8.80xec71Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:11:48.078160048 CET192.168.2.38.8.8.80x427dStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:11:53.198249102 CET192.168.2.38.8.8.80x28a1Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)

                                                                                                            DNS Answers

                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                            Feb 24, 2021 16:10:12.515024900 CET8.8.8.8192.168.2.30x827bNo error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:10:19.069571018 CET8.8.8.8192.168.2.30xb011No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:10:24.378185987 CET8.8.8.8192.168.2.30x7a43No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:10:45.679471970 CET8.8.8.8192.168.2.30x4f9No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:10:50.982461929 CET8.8.8.8192.168.2.30x2628No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:10:56.164819956 CET8.8.8.8192.168.2.30xe64dNo error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:11:16.755805969 CET8.8.8.8192.168.2.30x9cbeNo error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:11:21.921886921 CET8.8.8.8192.168.2.30x9e7dNo error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:11:27.146339893 CET8.8.8.8192.168.2.30xec71No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:11:48.098563910 CET8.8.8.8192.168.2.30x427dNo error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                                            Feb 24, 2021 16:11:53.212601900 CET8.8.8.8192.168.2.30x28a1No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)

                                                                                                            Code Manipulations

                                                                                                            Statistics

                                                                                                            Behavior

                                                                                                            Click to jump to process

                                                                                                            System Behavior

                                                                                                            General

                                                                                                            Start time:16:09:42
                                                                                                            Start date:24/02/2021
                                                                                                            Path:C:\Users\user\Desktop\Y5XyMnx8Ng.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:'C:\Users\user\Desktop\Y5XyMnx8Ng.exe'
                                                                                                            Imagebase:0x530000
                                                                                                            File size:790016 bytes
                                                                                                            MD5 hash:5BD6A6DBDA26ADA813C6F60FDFC7BA70
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:.Net C# or VB.NET
                                                                                                            Yara matches:
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.273575013.0000000003C11000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.273575013.0000000003C11000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.273575013.0000000003C11000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.274362960.00000000040F1000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.274362960.00000000040F1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.274362960.00000000040F1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                            Reputation:low

                                                                                                            General

                                                                                                            Start time:16:10:06
                                                                                                            Start date:24/02/2021
                                                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\LbSNAHQmeXYAoG' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EF2.tmp'
                                                                                                            Imagebase:0x320000
                                                                                                            File size:185856 bytes
                                                                                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high

                                                                                                            General

                                                                                                            Start time:16:10:06
                                                                                                            Start date:24/02/2021
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff6b2800000
                                                                                                            File size:625664 bytes
                                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high

                                                                                                            General

                                                                                                            Start time:16:10:07
                                                                                                            Start date:24/02/2021
                                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:{path}
                                                                                                            Imagebase:0x440000
                                                                                                            File size:32768 bytes
                                                                                                            MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:.Net C# or VB.NET
                                                                                                            Yara matches:
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.494335612.0000000005710000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.494335612.0000000005710000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.494335612.0000000005710000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.483906093.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.483906093.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.483906093.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.492975177.0000000003BBB000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.492975177.0000000003BBB000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.494301167.0000000005700000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.494301167.0000000005700000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.493799082.0000000004E80000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.493799082.0000000004E80000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            Reputation:moderate

                                                                                                            General

                                                                                                            Start time:16:10:09
                                                                                                            Start date:24/02/2021
                                                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp3911.tmp'
                                                                                                            Imagebase:0x320000
                                                                                                            File size:185856 bytes
                                                                                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high

                                                                                                            General

                                                                                                            Start time:16:10:09
                                                                                                            Start date:24/02/2021
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff6b2800000
                                                                                                            File size:625664 bytes
                                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high

                                                                                                            General

                                                                                                            Start time:16:10:10
                                                                                                            Start date:24/02/2021
                                                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp3C8D.tmp'
                                                                                                            Imagebase:0x320000
                                                                                                            File size:185856 bytes
                                                                                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high

                                                                                                            General

                                                                                                            Start time:16:10:10
                                                                                                            Start date:24/02/2021
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff6b2800000
                                                                                                            File size:625664 bytes
                                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high

                                                                                                            General

                                                                                                            Start time:16:10:10
                                                                                                            Start date:24/02/2021
                                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
                                                                                                            Imagebase:0x7d0000
                                                                                                            File size:32768 bytes
                                                                                                            MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:.Net C# or VB.NET
                                                                                                            Reputation:moderate

                                                                                                            General

                                                                                                            Start time:16:10:11
                                                                                                            Start date:24/02/2021
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff6b2800000
                                                                                                            File size:625664 bytes
                                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high

                                                                                                            General

                                                                                                            Start time:16:10:13
                                                                                                            Start date:24/02/2021
                                                                                                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                                                                            Imagebase:0x8c0000
                                                                                                            File size:32768 bytes
                                                                                                            MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:.Net C# or VB.NET
                                                                                                            Antivirus matches:
                                                                                                            • Detection: 0%, Metadefender, Browse
                                                                                                            • Detection: 0%, ReversingLabs
                                                                                                            Reputation:moderate

                                                                                                            General

                                                                                                            Start time:16:10:13
                                                                                                            Start date:24/02/2021
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff6b2800000
                                                                                                            File size:625664 bytes
                                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high

                                                                                                            General

                                                                                                            Start time:16:10:22
                                                                                                            Start date:24/02/2021
                                                                                                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                                                            Imagebase:0x760000
                                                                                                            File size:32768 bytes
                                                                                                            MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:.Net C# or VB.NET
                                                                                                            Reputation:moderate

                                                                                                            General

                                                                                                            Start time:16:10:22
                                                                                                            Start date:24/02/2021
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff6b2800000
                                                                                                            File size:625664 bytes
                                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language

                                                                                                            Disassembly

                                                                                                            Code Analysis

                                                                                                            Reset < >