Loading ...

Play interactive tourEdit tour

Analysis Report cp573oYDUX.exe

Overview

General Information

Sample Name:cp573oYDUX.exe
Analysis ID:357426
MD5:33cf3af09d2a1789a2bbad009a43edd5
SHA1:ffe606addd5694451511dd347bbc85a404328c9d
SHA256:8da32ea516feb3bc471ba01ed18cb0aca1a9f39966c86ca4624dd2cea2e226cd
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • cp573oYDUX.exe (PID: 7012 cmdline: 'C:\Users\user\Desktop\cp573oYDUX.exe' MD5: 33CF3AF09D2A1789A2BBAD009A43EDD5)
    • schtasks.exe (PID: 3800 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eVEWVTvFLGVU' /XML 'C:\Users\user\AppData\Local\Temp\tmp53F8.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 2264 cmdline: {path} MD5: 71369277D09DA0830C8C59F9E22BB23A)
      • schtasks.exe (PID: 6632 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpFC43.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5996 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpFF61.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • RegSvcs.exe (PID: 5692 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0 MD5: 71369277D09DA0830C8C59F9E22BB23A)
    • conhost.exe (PID: 5684 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 5680 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 71369277D09DA0830C8C59F9E22BB23A)
    • conhost.exe (PID: 6916 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 7144 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 71369277D09DA0830C8C59F9E22BB23A)
    • conhost.exe (PID: 7116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "572eb7a9-aedf-4b39-8669-f7563dab8a38", "Group": "GREAT", "Domain1": "strongodss.ddns.net", "Domain2": "79.134.225.43", "Port": 58103, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Enable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8009, "BufferSize": "02000100", "MaxPacketSize": "", "GCThreshold": "", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.600652707.0000000005030000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xe75:$x1: NanoCore.ClientPluginHost
  • 0xe8f:$x2: IClientNetworkHost
00000007.00000002.600652707.0000000005030000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xe75:$x2: NanoCore.ClientPluginHost
  • 0x1261:$s3: PipeExists
  • 0x1136:$s4: PipeCreated
  • 0xeb0:$s5: IClientLoggingHost
00000007.00000002.594405865.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000007.00000002.594405865.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000007.00000002.594405865.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    Click to see the 14 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    7.2.RegSvcs.exe.5030000.7.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    7.2.RegSvcs.exe.5030000.7.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    7.2.RegSvcs.exe.3daec9e.5.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x4083:$x1: NanoCore.ClientPluginHost
    7.2.RegSvcs.exe.3daec9e.5.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x4083:$x2: NanoCore.ClientPluginHost
    • 0x4161:$s4: PipeCreated
    • 0x409d:$s5: IClientLoggingHost
    7.2.RegSvcs.exe.3db9511.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xd9ad:$x1: NanoCore.ClientPluginHost
    • 0xd9da:$x2: IClientNetworkHost
    Click to see the 44 entries

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2264, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
    Sigma detected: Scheduled temp file as task from temp locationShow sources
    Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eVEWVTvFLGVU' /XML 'C:\Users\user\AppData\Local\Temp\tmp53F8.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eVEWVTvFLGVU' /XML 'C:\Users\user\AppData\Local\Temp\tmp53F8.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\cp573oYDUX.exe' , ParentImage: C:\Users\user\Desktop\cp573oYDUX.exe, ParentProcessId: 7012, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eVEWVTvFLGVU' /XML 'C:\Users\user\AppData\Local\Temp\tmp53F8.tmp', ProcessId: 3800

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 00000007.00000002.599620352.0000000003DA7000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "572eb7a9-aedf-4b39-8669-f7563dab8a38", "Group": "GREAT", "Domain1": "strongodss.ddns.net", "Domain2": "79.134.225.43", "Port": 58103, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Enable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8009, "BufferSize": "02000100", "MaxPacketSize": "", "GCThreshold": "", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
    Multi AV Scanner detection for domain / URLShow sources
    Source: strongodss.ddns.netVirustotal: Detection: 8%Perma Link
    Multi AV Scanner detection for dropped fileShow sources
    Source: C:\Users\user\AppData\Roaming\eVEWVTvFLGVU.exeReversingLabs: Detection: 31%
    Multi AV Scanner detection for submitted fileShow sources
    Source: cp573oYDUX.exeVirustotal: Detection: 32%Perma Link
    Source: cp573oYDUX.exeReversingLabs: Detection: 31%
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000007.00000002.594405865.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.599620352.0000000003DA7000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.601373463.00000000059A0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.373693780.00000000042F3000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2264, type: MEMORY
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3db9511.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3daec9e.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.cp573oYDUX.exe.4327b80.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.59a0000.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.cp573oYDUX.exe.4327b80.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.59a0000.11.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3db9511.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.59a4629.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3db3adb.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.cp573oYDUX.exe.435c3a0.3.raw.unpack, type: UNPACKEDPE
    Machine Learning detection for dropped fileShow sources
    Source: C:\Users\user\AppData\Roaming\eVEWVTvFLGVU.exeJoe Sandbox ML: detected
    Machine Learning detection for sampleShow sources
    Source: cp573oYDUX.exeJoe Sandbox ML: detected
    Source: 7.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 7.2.RegSvcs.exe.59a0000.11.unpackAvira: Label: TR/NanoCore.fadte

    Compliance:

    barindex
    Uses 32bit PE filesShow sources
    Source: cp573oYDUX.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Uses new MSVCR DllsShow sources
    Source: C:\Users\user\Desktop\cp573oYDUX.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
    Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
    Source: cp573oYDUX.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Binary contains paths to debug symbolsShow sources
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: RegSvcs.exe, 00000007.00000002.599620352.0000000003DA7000.00000004.00000001.sdmp
    Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.pdb source: RegSvcs.exe, 00000007.00000002.596359463.0000000002915000.00000004.00000040.sdmp
    Source: Binary string: System.EnterpriseServices.Wrapper.pdb source: dhcpmon.exe, 0000000E.00000002.381960692.00000000056A0000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.402048380.00000000054C0000.00000002.00000001.sdmp
    Source: Binary string: indows\RegSvcs.pdbpdbvcs.pdb source: RegSvcs.exe, 00000007.00000002.596359463.0000000002915000.00000004.00000040.sdmp
    Source: Binary string: C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000007.00000002.596359463.0000000002915000.00000004.00000040.sdmp
    Source: Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe.7.dr
    Source: Binary string: mscorrc.pdb source: cp573oYDUX.exe, 00000000.00000002.378302834.0000000006EF0000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.601059671.00000000056A0000.00000002.00000001.sdmp, RegSvcs.exe, 0000000C.00000002.380452902.0000000005530000.00000002.00000001.sdmp, dhcpmon.exe, 0000000E.00000002.382213793.0000000005750000.00000002.00000001.sdmp
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 4x nop then mov esp, ebp

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: 79.134.225.43
    Source: Malware configuration extractorURLs: strongodss.ddns.net
    Connects to many ports of the same IP (likely port scanning)Show sources
    Source: global trafficTCP traffic: 79.134.225.43 ports 0,1,3,58103,5,8
    Source: global trafficTCP traffic: 87.237.165.78 ports 0,1,3,58103,5,8
    Uses dynamic DNS servicesShow sources
    Source: unknownDNS query: name: strongodss.ddns.net
    Source: global trafficTCP traffic: 192.168.2.6:49724 -> 87.237.165.78:58103
    Source: global trafficTCP traffic: 192.168.2.6:49729 -> 79.134.225.43:58103
    Source: Joe Sandbox ViewIP Address: 79.134.225.43 79.134.225.43
    Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.43
    Source: unknownDNS traffic detected: queries for: strongodss.ddns.net
    Source: cp573oYDUX.exe, 00000000.00000003.329395807.0000000005253000.00000004.00000001.sdmpString found in binary or memory: http://en.w
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
    Source: cp573oYDUX.exe, 00000000.00000003.337101264.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.agfamonotype.
    Source: cp573oYDUX.exe, 00000000.00000003.328781426.000000000527F000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: cp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
    Source: cp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com(
    Source: cp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com.
    Source: cp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comEac
    Source: cp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC
    Source: cp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comal
    Source: cp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comams
    Source: cp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comfacG5w
    Source: cp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comic
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: cp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comn-u
    Source: cp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comona
    Source: cp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comtig55E
    Source: cp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comuct
    Source: cp573oYDUX.exe, 00000000.00000003.331677577.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: cp573oYDUX.exe, 00000000.00000003.332897804.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/_
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmp, cp573oYDUX.exe, 00000000.00000003.333338294.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: cp573oYDUX.exe, 00000000.00000003.332932000.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: cp573oYDUX.exe, 00000000.00000003.332869924.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlp
    Source: cp573oYDUX.exe, 00000000.00000003.332131926.0000000005281000.00000004.00000001.sdmp, cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
    Source: cp573oYDUX.exe, 00000000.00000003.332131926.0000000005281000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html8p(
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: cp573oYDUX.exe, 00000000.00000003.332247018.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersa
    Source: cp573oYDUX.exe, 00000000.00000003.333160694.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersr
    Source: cp573oYDUX.exe, 00000000.00000003.333160694.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com=
    Source: cp573oYDUX.exe, 00000000.00000002.374558524.0000000005250000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
    Source: cp573oYDUX.exe, 00000000.00000003.333507582.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comals
    Source: cp573oYDUX.exe, 00000000.00000003.331677577.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdi
    Source: cp573oYDUX.exe, 00000000.00000003.331556678.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comgrito
    Source: cp573oYDUX.exe, 00000000.00000003.331677577.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comiond
    Source: cp573oYDUX.exe, 00000000.00000003.332598799.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comitudF
    Source: cp573oYDUX.exe, 00000000.00000003.331677577.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comonyF
    Source: cp573oYDUX.exe, 00000000.00000003.333160694.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comrsiv
    Source: cp573oYDUX.exe, 00000000.00000003.333160694.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comt
    Source: cp573oYDUX.exe, 00000000.00000003.332897804.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comueikM
    Source: cp573oYDUX.exe, 00000000.00000003.327285488.0000000005285000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
    Source: cp573oYDUX.exe, 00000000.00000003.326989499.000000000116C000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comont
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: cp573oYDUX.exe, 00000000.00000003.328672332.000000000527F000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: cp573oYDUX.exe, 00000000.00000003.328391063.000000000527D000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnhy/
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: cp573oYDUX.exe, 00000000.00000003.328160873.000000000525E000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr:
    Source: cp573oYDUX.exe, 00000000.00000003.328160873.000000000525E000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.krnyis
    Source: cp573oYDUX.exe, 00000000.00000003.330299816.000000000525A000.00000004.00000001.sdmp, cp573oYDUX.exe, 00000000.00000003.330044302.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: cp573oYDUX.exe, 00000000.00000003.329818359.0000000005259000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//typ
    Source: cp573oYDUX.exe, 00000000.00000003.329395807.0000000005253000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/F
    Source: cp573oYDUX.exe, 00000000.00000003.329818359.0000000005259000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/RJG
    Source: cp573oYDUX.exe, 00000000.00000003.330163656.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0P
    Source: cp573oYDUX.exe, 00000000.00000003.329818359.0000000005259000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/_
    Source: cp573oYDUX.exe, 00000000.00000003.330044302.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/b
    Source: cp573oYDUX.exe, 00000000.00000003.329939920.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/i
    Source: cp573oYDUX.exe, 00000000.00000003.330299816.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
    Source: cp573oYDUX.exe, 00000000.00000003.330163656.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/F
    Source: cp573oYDUX.exe, 00000000.00000003.330163656.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/_
    Source: cp573oYDUX.exe, 00000000.00000003.329395807.0000000005253000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/s-c
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: cp573oYDUX.exe, 00000000.00000003.328160873.000000000525E000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr-h
    Source: cp573oYDUX.exe, 00000000.00000003.328160873.000000000525E000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krlns
    Source: cp573oYDUX.exe, 00000000.00000003.328160873.000000000525E000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krproductW
    Source: cp573oYDUX.exe, 00000000.00000003.328160873.000000000525E000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krx
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
    Source: cp573oYDUX.exe, 00000000.00000003.333449545.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
    Source: cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: cp573oYDUX.exe, 00000000.00000003.333507582.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deX
    Source: cp573oYDUX.exe, 00000000.00000003.333449545.000000000525A000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deeg
    Source: cp573oYDUX.exe, 00000000.00000003.328825494.0000000005280000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: dhcpmon.exe, 0000000E.00000002.379814239.0000000001588000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
    Source: RegSvcs.exe, 00000007.00000002.599620352.0000000003DA7000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud:

    barindex
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000007.00000002.594405865.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.599620352.0000000003DA7000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.601373463.00000000059A0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.373693780.00000000042F3000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2264, type: MEMORY
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3db9511.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3daec9e.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.cp573oYDUX.exe.4327b80.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.59a0000.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.cp573oYDUX.exe.4327b80.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.59a0000.11.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3db9511.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.59a4629.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3db3adb.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.cp573oYDUX.exe.435c3a0.3.raw.unpack, type: UNPACKEDPE

    Operating System Destruction:

    barindex
    Protects its processes via BreakOnTermination flagShow sources
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: 01 00 00 00

    System Summary:

    barindex
    Malicious sample detected (through community Yara rule)Show sources
    Source: 00000007.00000002.600652707.0000000005030000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000007.00000002.594405865.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000007.00000002.594405865.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000007.00000002.599620352.0000000003DA7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000007.00000002.601347713.0000000005990000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000007.00000002.601373463.00000000059A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.373693780.00000000042F3000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.373693780.00000000042F3000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: RegSvcs.exe PID: 2264, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: RegSvcs.exe PID: 2264, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 7.2.RegSvcs.exe.5030000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 7.2.RegSvcs.exe.3daec9e.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 7.2.RegSvcs.exe.3db9511.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 7.2.RegSvcs.exe.2d716fc.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 7.2.RegSvcs.exe.3daec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 7.2.RegSvcs.exe.3daec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.cp573oYDUX.exe.4327b80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.cp573oYDUX.exe.4327b80.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 7.2.RegSvcs.exe.59a0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.cp573oYDUX.exe.4327b80.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.cp573oYDUX.exe.4327b80.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 7.2.RegSvcs.exe.59a0000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 7.2.RegSvcs.exe.5990000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 7.2.RegSvcs.exe.3db9511.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 7.2.RegSvcs.exe.59a4629.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 7.2.RegSvcs.exe.2d76578.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 7.2.RegSvcs.exe.2d716fc.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 7.2.RegSvcs.exe.3db3adb.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 7.2.RegSvcs.exe.3db3adb.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.cp573oYDUX.exe.435c3a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.cp573oYDUX.exe.435c3a0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_04FB1836 NtQuerySystemInformation,
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_04FB1572 NtSetInformationProcess,
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_04FB1541 NtSetInformationProcess,
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_04FB17FB NtQuerySystemInformation,
    Source: C:\Users\user\Desktop\cp573oYDUX.exeCode function: 0_2_007A77E7
    Source: C:\Users\user\Desktop\cp573oYDUX.exeCode function: 0_2_05022398
    Source: C:\Users\user\Desktop\cp573oYDUX.exeCode function: 0_2_05024DDF
    Source: C:\Users\user\Desktop\cp573oYDUX.exeCode function: 0_2_050230D1
    Source: C:\Users\user\Desktop\cp573oYDUX.exeCode function: 0_2_050230E0
    Source: C:\Users\user\Desktop\cp573oYDUX.exeCode function: 0_2_0502331B
    Source: C:\Users\user\Desktop\cp573oYDUX.exeCode function: 0_2_05022389
    Source: C:\Users\user\Desktop\cp573oYDUX.exeCode function: 0_2_06DB48E6
    Source: C:\Users\user\Desktop\cp573oYDUX.exeCode function: 0_2_06DB51FC
    Source: C:\Users\user\Desktop\cp573oYDUX.exeCode function: 0_2_05020100
    Source: C:\Users\user\Desktop\cp573oYDUX.exeCode function: 0_2_05020110
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_02909A68
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_02908E68
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_029023A0
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_02902FA8
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0290B738
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_02903850
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_02909B2F
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0290306F
    Source: cp573oYDUX.exeBinary or memory string: OriginalFilename vs cp573oYDUX.exe
    Source: cp573oYDUX.exe, 00000000.00000002.374476566.0000000005120000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs cp573oYDUX.exe
    Source: cp573oYDUX.exe, 00000000.00000002.380228840.0000000007930000.00000002.00000001.sdmpBinary or memory string: originalfilename vs cp573oYDUX.exe
    Source: cp573oYDUX.exe, 00000000.00000002.380228840.0000000007930000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs cp573oYDUX.exe
    Source: cp573oYDUX.exe, 00000000.00000002.372857838.0000000003E11000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAssemblyReferenceEntry.exeD vs cp573oYDUX.exe
    Source: cp573oYDUX.exe, 00000000.00000002.378302834.0000000006EF0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs cp573oYDUX.exe
    Source: cp573oYDUX.exe, 00000000.00000002.380044787.0000000007840000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs cp573oYDUX.exe
    Source: cp573oYDUX.exeBinary or memory string: OriginalFilenameCA vs cp573oYDUX.exe
    Source: cp573oYDUX.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: 00000007.00000002.600652707.0000000005030000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000007.00000002.600652707.0000000005030000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000007.00000002.594405865.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000007.00000002.594405865.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000007.00000002.599620352.0000000003DA7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000007.00000002.601347713.0000000005990000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000007.00000002.601347713.0000000005990000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000007.00000002.601373463.00000000059A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000007.00000002.601373463.00000000059A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000000.00000002.373693780.00000000042F3000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000000.00000002.373693780.00000000042F3000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: RegSvcs.exe PID: 2264, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: RegSvcs.exe PID: 2264, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 7.2.RegSvcs.exe.5030000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 7.2.RegSvcs.exe.5030000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 7.2.RegSvcs.exe.3daec9e.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 7.2.RegSvcs.exe.3daec9e.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 7.2.RegSvcs.exe.3db9511.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 7.2.RegSvcs.exe.3db9511.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 7.2.RegSvcs.exe.2d716fc.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 7.2.RegSvcs.exe.2d716fc.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 7.2.RegSvcs.exe.3daec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 7.2.RegSvcs.exe.3daec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 7.2.RegSvcs.exe.3daec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.cp573oYDUX.exe.4327b80.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.cp573oYDUX.exe.4327b80.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 7.2.RegSvcs.exe.59a0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 7.2.RegSvcs.exe.59a0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0.2.cp573oYDUX.exe.4327b80.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.cp573oYDUX.exe.4327b80.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0.2.cp573oYDUX.exe.4327b80.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 7.2.RegSvcs.exe.59a0000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 7.2.RegSvcs.exe.59a0000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 7.2.RegSvcs.exe.5990000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 7.2.RegSvcs.exe.5990000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 7.2.RegSvcs.exe.3db9511.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 7.2.RegSvcs.exe.3db9511.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 7.2.RegSvcs.exe.59a4629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 7.2.RegSvcs.exe.59a4629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 7.2.RegSvcs.exe.2d76578.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 7.2.RegSvcs.exe.2d76578.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 7.2.RegSvcs.exe.2d716fc.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 7.2.RegSvcs.exe.2d716fc.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 7.2.RegSvcs.exe.3db3adb.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 7.2.RegSvcs.exe.3db3adb.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 7.2.RegSvcs.exe.3db3adb.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.cp573oYDUX.exe.435c3a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.cp573oYDUX.exe.435c3a0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: cp573oYDUX.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: eVEWVTvFLGVU.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: classification engineClassification label: mal100.troj.evad.winEXE@18/13@12/2
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_04FB13F6 AdjustTokenPrivileges,
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_04FB13BF AdjustTokenPrivileges,
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
    Source: C:\Users\user\Desktop\cp573oYDUX.exeFile created: C:\Users\user\AppData\Roaming\eVEWVTvFLGVU.exeJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4112:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5684:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6916:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7116:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5144:120:WilError_01
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6620:120:WilError_01
    Source: C:\Users\user\Desktop\cp573oYDUX.exeMutant created: \Sessions\1\BaseNamedObjects\iUCkNaGJKDECbn
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{572eb7a9-aedf-4b39-8669-f7563dab8a38}
    Source: C:\Users\user\Desktop\cp573oYDUX.exeFile created: C:\Users\user\AppData\Local\Temp\tmp53F8.tmpJump to behavior
    Source: cp573oYDUX.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\cp573oYDUX.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\cp573oYDUX.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
    Source: C:\Users\user\Desktop\cp573oYDUX.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
    Source: C:\Users\user\Desktop\cp573oYDUX.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\cp573oYDUX.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: cp573oYDUX.exeVirustotal: Detection: 32%
    Source: cp573oYDUX.exeReversingLabs: Detection: 31%
    Source: C:\Users\user\Desktop\cp573oYDUX.exeFile read: C:\Users\user\Desktop\cp573oYDUX.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\cp573oYDUX.exe 'C:\Users\user\Desktop\cp573oYDUX.exe'
    Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eVEWVTvFLGVU' /XML 'C:\Users\user\AppData\Local\Temp\tmp53F8.tmp'
    Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe {path}
    Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpFC43.tmp'
    Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpFF61.tmp'
    Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
    Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
    Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
    Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eVEWVTvFLGVU' /XML 'C:\Users\user\AppData\Local\Temp\tmp53F8.tmp'
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe {path}
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpFC43.tmp'
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpFF61.tmp'
    Source: C:\Users\user\Desktop\cp573oYDUX.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\cp573oYDUX.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
    Source: cp573oYDUX.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: C:\Users\user\Desktop\cp573oYDUX.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
    Source: cp573oYDUX.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: RegSvcs.exe, 00000007.00000002.599620352.0000000003DA7000.00000004.00000001.sdmp
    Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.pdb source: RegSvcs.exe, 00000007.00000002.596359463.0000000002915000.00000004.00000040.sdmp
    Source: Binary string: System.EnterpriseServices.Wrapper.pdb source: dhcpmon.exe, 0000000E.00000002.381960692.00000000056A0000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.402048380.00000000054C0000.00000002.00000001.sdmp
    Source: Binary string: indows\RegSvcs.pdbpdbvcs.pdb source: RegSvcs.exe, 00000007.00000002.596359463.0000000002915000.00000004.00000040.sdmp
    Source: Binary string: C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000007.00000002.596359463.0000000002915000.00000004.00000040.sdmp
    Source: Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe.7.dr
    Source: Binary string: mscorrc.pdb source: cp573oYDUX.exe, 00000000.00000002.378302834.0000000006EF0000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.601059671.00000000056A0000.00000002.00000001.sdmp, RegSvcs.exe, 0000000C.00000002.380452902.0000000005530000.00000002.00000001.sdmp, dhcpmon.exe, 0000000E.00000002.382213793.0000000005750000.00000002.00000001.sdmp

    Data Obfuscation:

    barindex
    .NET source code contains potential unpackerShow sources
    Source: cp573oYDUX.exe, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: eVEWVTvFLGVU.exe.0.dr, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 0.2.cp573oYDUX.exe.7a0000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 0.0.cp573oYDUX.exe.7a0000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: C:\Users\user\Desktop\cp573oYDUX.exeCode function: 0_2_05026A11 push ds; retf
    Source: initial sampleStatic PE information: section name: .text entropy: 7.94883955827
    Source: initial sampleStatic PE information: section name: .text entropy: 7.94883955827
    Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: C:\Users\user\Desktop\cp573oYDUX.exeFile created: C:\Users\user\AppData\Roaming\eVEWVTvFLGVU.exeJump to dropped file
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

    Boot Survival:

    barindex
    Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
    Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eVEWVTvFLGVU' /XML 'C:\Users\user\AppData\Local\Temp\tmp53F8.tmp'

    Hooking and other Techniques for Hiding and Protection:

    barindex
    Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe:Zone.Identifier read attributes | delete
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion:

    barindex
    Yara detected AntiVM_3Show sources
    Source: Yara matchFile source: Process Memory Space: cp573oYDUX.exe PID: 7012, type: MEMORY
    Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)Show sources
    Source: C:\Users\user\Desktop\cp573oYDUX.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
    Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
    Source: cp573oYDUX.exe, 00000000.00000002.371863417.000000000337E000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME<
    Source: cp573oYDUX.exe, 00000000.00000002.371863417.000000000337E000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
    Source: cp573oYDUX.exe, 00000000.00000002.372804560.0000000003505000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
    Source: C:\Users\user\Desktop\cp573oYDUX.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier
    Source: C:\Users\user\Desktop\cp573oYDUX.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
    Source: C:\Users\user\Desktop\cp573oYDUX.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
    Source: C:\Users\user\Desktop\cp573oYDUX.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: C:\Users\user\Desktop\cp573oYDUX.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum name: 0
    Source: C:\Users\user\Desktop\cp573oYDUX.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
    Source: C:\Users\user\Desktop\cp573oYDUX.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: foregroundWindowGot 788
    Source: C:\Users\user\Desktop\cp573oYDUX.exe TID: 7080Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6696Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5700Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_04FB161A GetSystemInfo,
    Source: cp573oYDUX.exe, 00000000.00000002.371863417.000000000337E000.00000004.00000001.sdmpBinary or memory string: kr#"SOFTWARE\VMware, Inc.\VMware Tools<
    Source: cp573oYDUX.exe, 00000000.00000002.371863417.000000000337E000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II<
    Source: RegSvcs.exe, 00000007.00000002.595640226.0000000000D76000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW.
    Source: RegSvcs.exe, 00000007.00000002.601767423.0000000006390000.00000002.00000001.sdmp, RegSvcs.exe, 0000000C.00000002.380544790.0000000005590000.00000002.00000001.sdmp, dhcpmon.exe, 0000000E.00000002.382357491.00000000057B0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
    Source: cp573oYDUX.exe, 00000000.00000002.371863417.000000000337E000.00000004.00000001.sdmpBinary or memory string: vmware
    Source: cp573oYDUX.exe, 00000000.00000002.371863417.000000000337E000.00000004.00000001.sdmpBinary or memory string: kr&%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\<
    Source: cp573oYDUX.exe, 00000000.00000002.371863417.000000000337E000.00000004.00000001.sdmpBinary or memory string: krA"SOFTWARE\VMware, Inc.\VMware Tools
    Source: cp573oYDUX.exe, 00000000.00000002.371863417.000000000337E000.00000004.00000001.sdmpBinary or memory string: kr%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
    Source: cp573oYDUX.exe, 00000000.00000002.372804560.0000000003505000.00000004.00000001.sdmpBinary or memory string: VMWARE<
    Source: cp573oYDUX.exe, 00000000.00000002.371863417.000000000337E000.00000004.00000001.sdmpBinary or memory string: kr87HKEY_LOCAL_MACHINE\SOFTWARE\VMware, Inc.\VMware Tools\.
    Source: cp573oYDUX.exe, 00000000.00000002.372804560.0000000003505000.00000004.00000001.sdmpBinary or memory string: VMWARE
    Source: cp573oYDUX.exe, 00000000.00000002.371863417.000000000337E000.00000004.00000001.sdmpBinary or memory string: kr"SOFTWARE\VMware, Inc.\VMware Tools
    Source: cp573oYDUX.exe, 00000000.00000002.371863417.000000000337E000.00000004.00000001.sdmpBinary or memory string: QEMU<
    Source: RegSvcs.exe, 00000007.00000002.601767423.0000000006390000.00000002.00000001.sdmp, RegSvcs.exe, 0000000C.00000002.380544790.0000000005590000.00000002.00000001.sdmp, dhcpmon.exe, 0000000E.00000002.382357491.00000000057B0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
    Source: RegSvcs.exe, 00000007.00000002.601767423.0000000006390000.00000002.00000001.sdmp, RegSvcs.exe, 0000000C.00000002.380544790.0000000005590000.00000002.00000001.sdmp, dhcpmon.exe, 0000000E.00000002.382357491.00000000057B0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
    Source: cp573oYDUX.exe, 00000000.00000002.371863417.000000000337E000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
    Source: cp573oYDUX.exe, 00000000.00000002.371863417.000000000337E000.00000004.00000001.sdmpBinary or memory string: kr#"SOFTWARE\VMware, Inc.\VMware ToolsH
    Source: RegSvcs.exe, 00000007.00000002.595725348.0000000000DB7000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllTokenRoleProvider, System.Web, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a"/>
    Source: RegSvcs.exe, 00000007.00000002.601767423.0000000006390000.00000002.00000001.sdmp, RegSvcs.exe, 0000000C.00000002.380544790.0000000005590000.00000002.00000001.sdmp, dhcpmon.exe, 0000000E.00000002.382357491.00000000057B0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
    Source: C:\Users\user\Desktop\cp573oYDUX.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Allocates memory in foreign processesShow sources
    Source: C:\Users\user\Desktop\cp573oYDUX.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 protect: page execute and read and write
    Injects a PE file into a foreign processesShow sources
    Source: C:\Users\user\Desktop\cp573oYDUX.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 value starts with: 4D5A
    Writes to foreign memory regionsShow sources
    Source: C:\Users\user\Desktop\cp573oYDUX.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000
    Source: C:\Users\user\Desktop\cp573oYDUX.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 402000
    Source: C:\Users\user\Desktop\cp573oYDUX.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 420000
    Source: C:\Users\user\Desktop\cp573oYDUX.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 422000
    Source: C:\Users\user\Desktop\cp573oYDUX.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 998008
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eVEWVTvFLGVU' /XML 'C:\Users\user\AppData\Local\Temp\tmp53F8.tmp'
    Source: C:\Users\user\Desktop\cp573oYDUX.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe {path}
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpFC43.tmp'
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpFF61.tmp'
    Source: RegSvcs.exe, 00000007.00000002.597871588.0000000002E89000.00000004.00000001.sdmpBinary or memory string: Program Manager
    Source: RegSvcs.exe, 00000007.00000002.596088903.0000000001430000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: RegSvcs.exe, 00000007.00000002.596088903.0000000001430000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: RegSvcs.exe, 00000007.00000002.597664140.0000000002DF7000.00000004.00000001.sdmpBinary or memory string: Program Managern could be made because the target machine actively refused it L
    Source: RegSvcs.exe, 00000007.00000002.596088903.0000000001430000.00000002.00000001.sdmpBinary or memory string: &Program Manager
    Source: RegSvcs.exe, 00000007.00000002.596088903.0000000001430000.00000002.00000001.sdmpBinary or memory string: Progmanlock
    Source: RegSvcs.exe, 00000007.00000002.595725348.0000000000DB7000.00000004.00000020.sdmpBinary or memory string: Program Manager (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
    Source: C:\Users\user\Desktop\cp573oYDUX.exeCode function: 0_2_07220FF2 GetUserNameA,
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Stealing of Sensitive Information:

    barindex
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000007.00000002.594405865.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.599620352.0000000003DA7000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.601373463.00000000059A0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.373693780.00000000042F3000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2264, type: MEMORY
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3db9511.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3daec9e.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.cp573oYDUX.exe.4327b80.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.59a0000.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.cp573oYDUX.exe.4327b80.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.59a0000.11.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3db9511.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.59a4629.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3db3adb.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.cp573oYDUX.exe.435c3a0.3.raw.unpack, type: UNPACKEDPE

    Remote Access Functionality:

    barindex
    Detected Nanocore RatShow sources
    Source: RegSvcs.exe, 00000007.00000002.600652707.0000000005030000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: RegSvcs.exe, 00000007.00000002.600652707.0000000005030000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: RegSvcs.exe, 00000007.00000002.599620352.0000000003DA7000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000007.00000002.594405865.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.599620352.0000000003DA7000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.601373463.00000000059A0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.373693780.00000000042F3000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2264, type: MEMORY
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3db9511.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3daec9e.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.cp573oYDUX.exe.4327b80.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.59a0000.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.cp573oYDUX.exe.4327b80.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.59a0000.11.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3db9511.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.59a4629.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.RegSvcs.exe.3db3adb.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.cp573oYDUX.exe.435c3a0.3.raw.unpack, type: UNPACKEDPE
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_04FB2B26 bind,
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_04FB2AF6 bind,

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Access Token Manipulation1Disable or Modify Tools1Input Capture21Account Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsProcess Injection312Deobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture21Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Obfuscated Files or Information3Security Account ManagerSystem Information Discovery13SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing13NTDSSecurity Software Discovery311Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading2LSA SecretsVirtualization/Sandbox Evasion13SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion13Cached Domain CredentialsProcess Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection312Proc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 357426 Sample: cp573oYDUX.exe Startdate: 24/02/2021 Architecture: WINDOWS Score: 100 52 strongodss.ddns.net 2->52 58 Multi AV Scanner detection for domain / URL 2->58 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 64 15 other signatures 2->64 9 cp573oYDUX.exe 6 2->9         started        13 RegSvcs.exe 4 2->13         started        15 dhcpmon.exe 4 2->15         started        17 dhcpmon.exe 3 2->17         started        signatures3 process4 file5 46 C:\Users\user\AppData\...\eVEWVTvFLGVU.exe, PE32 9->46 dropped 48 C:\Users\user\AppData\Local\...\tmp53F8.tmp, XML 9->48 dropped 50 C:\Users\user\AppData\...\cp573oYDUX.exe.log, ASCII 9->50 dropped 72 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 9->72 74 Writes to foreign memory regions 9->74 76 Allocates memory in foreign processes 9->76 78 Injects a PE file into a foreign processes 9->78 19 RegSvcs.exe 1 13 9->19         started        24 schtasks.exe 1 9->24         started        26 conhost.exe 13->26         started        28 conhost.exe 15->28         started        30 conhost.exe 17->30         started        signatures6 process7 dnsIp8 54 strongodss.ddns.net 87.237.165.78, 49724, 49727, 49728 MTVHGB Russian Federation 19->54 56 79.134.225.43, 49729, 49730, 49741 FINK-TELECOM-SERVICESCH Switzerland 19->56 42 C:\Users\user\AppData\Roaming\...\run.dat, data 19->42 dropped 44 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->44 dropped 66 Protects its processes via BreakOnTermination flag 19->66 68 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->68 32 schtasks.exe 1 19->32         started        34 schtasks.exe 1 19->34         started        36 conhost.exe 24->36         started        file9 70 Uses dynamic DNS services 54->70 signatures10 process11 process12 38 conhost.exe 32->38         started        40 conhost.exe 34->40         started       

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    cp573oYDUX.exe33%VirustotalBrowse
    cp573oYDUX.exe31%ReversingLabsWin32.Trojan.AgentTesla
    cp573oYDUX.exe100%Joe Sandbox ML

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\eVEWVTvFLGVU.exe100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs
    C:\Users\user\AppData\Roaming\eVEWVTvFLGVU.exe31%ReversingLabsWin32.Trojan.AgentTesla

    Unpacked PE Files

    SourceDetectionScannerLabelLinkDownload
    7.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    7.2.RegSvcs.exe.59a0000.11.unpack100%AviraTR/NanoCore.fadteDownload File

    Domains

    SourceDetectionScannerLabelLink
    strongodss.ddns.net8%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    79.134.225.431%VirustotalBrowse
    79.134.225.430%Avira URL Cloudsafe
    http://www.carterandcone.comn-u0%URL Reputationsafe
    http://www.carterandcone.comn-u0%URL Reputationsafe
    http://www.carterandcone.comn-u0%URL Reputationsafe
    http://www.carterandcone.comn-u0%URL Reputationsafe
    http://www.fontbureau.comitudF0%Avira URL Cloudsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/F0%Avira URL Cloudsafe
    http://www.carterandcone.comams0%Avira URL Cloudsafe
    http://www.carterandcone.comal0%Avira URL Cloudsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.sandoll.co.kr-h0%Avira URL Cloudsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.carterandcone.com0%URL Reputationsafe
    http://www.carterandcone.com0%URL Reputationsafe
    http://www.carterandcone.com0%URL Reputationsafe
    http://www.carterandcone.com(0%Avira URL Cloudsafe
    http://www.carterandcone.com.0%URL Reputationsafe
    http://www.carterandcone.com.0%URL Reputationsafe
    http://www.carterandcone.com.0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/_0%Avira URL Cloudsafe
    http://www.fonts.comont0%Avira URL Cloudsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp//typ0%Avira URL Cloudsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://www.sandoll.co.krproductW0%Avira URL Cloudsafe
    http://www.carterandcone.comEac0%Avira URL Cloudsafe
    http://www.founder.com.cn/cnhy/0%Avira URL Cloudsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.fontbureau.comgrito0%URL Reputationsafe
    http://www.fontbureau.comgrito0%URL Reputationsafe
    http://www.fontbureau.comgrito0%URL Reputationsafe
    http://www.carterandcone.comuct0%Avira URL Cloudsafe
    http://www.fontbureau.comrsiv0%Avira URL Cloudsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.urwpp.de0%URL Reputationsafe
    http://www.urwpp.de0%URL Reputationsafe
    http://www.urwpp.de0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    http://www.fontbureau.com=0%Avira URL Cloudsafe
    http://www.carterandcone.comic0%Avira URL Cloudsafe
    http://www.goodfont.co.kr:0%Avira URL Cloudsafe
    http://www.urwpp.deX0%Avira URL Cloudsafe
    http://www.sandoll.co.krx0%Avira URL Cloudsafe
    http://www.agfamonotype.0%URL Reputationsafe
    http://www.agfamonotype.0%URL Reputationsafe
    http://www.agfamonotype.0%URL Reputationsafe
    http://www.carterandcone.comTC0%URL Reputationsafe
    http://www.carterandcone.comTC0%URL Reputationsafe
    http://www.carterandcone.comTC0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/Y0P0%Avira URL Cloudsafe
    http://www.fontbureau.comonyF0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/F0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/F0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/F0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://www.sandoll.co.krlns0%Avira URL Cloudsafe
    http://www.carterandcone.comtig55E0%Avira URL Cloudsafe
    http://www.fontbureau.coma0%URL Reputationsafe
    http://www.fontbureau.coma0%URL Reputationsafe
    http://www.fontbureau.coma0%URL Reputationsafe
    http://en.w0%URL Reputationsafe
    http://en.w0%URL Reputationsafe
    http://en.w0%URL Reputationsafe
    http://www.fontbureau.comdi0%Avira URL Cloudsafe
    strongodss.ddns.net0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    strongodss.ddns.net
    87.237.165.78
    truetrueunknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    79.134.225.43true
    • 1%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    strongodss.ddns.nettrue
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://www.fontbureau.com/designersGcp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
      high
      http://www.carterandcone.comn-ucp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.fontbureau.com/designers/?cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
        high
        http://www.fontbureau.comitudFcp573oYDUX.exe, 00000000.00000003.332598799.000000000525A000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.founder.com.cn/cn/bThecp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.jiyu-kobo.co.jp/jp/Fcp573oYDUX.exe, 00000000.00000003.330163656.000000000525A000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designers?cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
          high
          http://www.carterandcone.comamscp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.carterandcone.comalcp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.tiro.comcp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designerscp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmp, cp573oYDUX.exe, 00000000.00000003.333338294.000000000525A000.00000004.00000001.sdmpfalse
            high
            http://www.sandoll.co.kr-hcp573oYDUX.exe, 00000000.00000003.328160873.000000000525E000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.goodfont.co.krcp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.carterandcone.comcp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.carterandcone.com(cp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://www.carterandcone.com.cp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.sajatypeworks.comcp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.typography.netDcp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/cThecp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/jp/_cp573oYDUX.exe, 00000000.00000003.330163656.000000000525A000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fonts.comontcp573oYDUX.exe, 00000000.00000003.326989499.000000000116C000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.galapagosdesign.com/staff/dennis.htmcp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp//typcp573oYDUX.exe, 00000000.00000003.329818359.0000000005259000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://fontfabrik.comcp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.sandoll.co.krproductWcp573oYDUX.exe, 00000000.00000003.328160873.000000000525E000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designersacp573oYDUX.exe, 00000000.00000003.332247018.000000000525A000.00000004.00000001.sdmpfalse
              high
              http://www.carterandcone.comEaccp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.founder.com.cn/cnhy/cp573oYDUX.exe, 00000000.00000003.328391063.000000000527D000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.galapagosdesign.com/DPleasecp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.fontbureau.comgritocp573oYDUX.exe, 00000000.00000003.331556678.000000000525A000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.carterandcone.comuctcp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.comrsivcp573oYDUX.exe, 00000000.00000003.333160694.000000000525A000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fonts.comcp573oYDUX.exe, 00000000.00000003.327285488.0000000005285000.00000004.00000001.sdmpfalse
                high
                http://www.sandoll.co.krcp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.urwpp.deDPleasecp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.urwpp.decp573oYDUX.exe, 00000000.00000003.333449545.000000000525A000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.zhongyicts.com.cncp573oYDUX.exe, 00000000.00000003.328825494.0000000005280000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.sakkal.comcp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com=cp573oYDUX.exe, 00000000.00000003.333160694.000000000525A000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://www.carterandcone.comiccp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designersrcp573oYDUX.exe, 00000000.00000003.333160694.000000000525A000.00000004.00000001.sdmpfalse
                  high
                  http://www.goodfont.co.kr:cp573oYDUX.exe, 00000000.00000003.328160873.000000000525E000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.urwpp.deXcp573oYDUX.exe, 00000000.00000003.333507582.000000000525A000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.apache.org/licenses/LICENSE-2.0cp573oYDUX.exe, 00000000.00000003.328781426.000000000527F000.00000004.00000001.sdmpfalse
                    high
                    http://www.fontbureau.comcp573oYDUX.exe, 00000000.00000003.331677577.000000000525A000.00000004.00000001.sdmpfalse
                      high
                      http://www.fontbureau.com/_cp573oYDUX.exe, 00000000.00000003.332897804.000000000525A000.00000004.00000001.sdmpfalse
                        high
                        http://www.sandoll.co.krxcp573oYDUX.exe, 00000000.00000003.328160873.000000000525E000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.agfamonotype.cp573oYDUX.exe, 00000000.00000003.337101264.0000000005281000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlpcp573oYDUX.exe, 00000000.00000003.332869924.0000000005281000.00000004.00000001.sdmpfalse
                          high
                          http://www.carterandcone.comTCcp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/Y0Pcp573oYDUX.exe, 00000000.00000003.330163656.000000000525A000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.comonyFcp573oYDUX.exe, 00000000.00000003.331677577.000000000525A000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/Fcp573oYDUX.exe, 00000000.00000003.329395807.0000000005253000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/jp/cp573oYDUX.exe, 00000000.00000003.330299816.000000000525A000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.sandoll.co.krlnscp573oYDUX.exe, 00000000.00000003.328160873.000000000525E000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.carterandcone.comtig55Ecp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.comacp573oYDUX.exe, 00000000.00000002.374558524.0000000005250000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://en.wcp573oYDUX.exe, 00000000.00000003.329395807.0000000005253000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comdicp573oYDUX.exe, 00000000.00000003.331677577.000000000525A000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.carterandcone.comlcp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.goodfont.co.krnyiscp573oYDUX.exe, 00000000.00000003.328160873.000000000525E000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.html8p(cp573oYDUX.exe, 00000000.00000003.332131926.0000000005281000.00000004.00000001.sdmpfalse
                            high
                            http://www.urwpp.deegcp573oYDUX.exe, 00000000.00000003.333449545.000000000525A000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.founder.com.cn/cn/cp573oYDUX.exe, 00000000.00000003.328672332.000000000527F000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNcp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
                              high
                              http://www.jiyu-kobo.co.jp/RJGcp573oYDUX.exe, 00000000.00000003.329818359.0000000005259000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.comiondcp573oYDUX.exe, 00000000.00000003.331677577.000000000525A000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.founder.com.cn/cncp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-jones.htmlcp573oYDUX.exe, 00000000.00000003.332131926.0000000005281000.00000004.00000001.sdmp, cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
                                high
                                http://www.carterandcone.comfacG5wcp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlcp573oYDUX.exe, 00000000.00000003.332932000.0000000005281000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.fontbureau.comtcp573oYDUX.exe, 00000000.00000003.333160694.000000000525A000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/cp573oYDUX.exe, 00000000.00000003.330299816.000000000525A000.00000004.00000001.sdmp, cp573oYDUX.exe, 00000000.00000003.330044302.000000000525A000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comonacp573oYDUX.exe, 00000000.00000003.329047446.0000000005281000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/icp573oYDUX.exe, 00000000.00000003.329939920.000000000525A000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers8cp573oYDUX.exe, 00000000.00000002.374864091.00000000053C0000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.fontbureau.comueikMcp573oYDUX.exe, 00000000.00000003.332897804.000000000525A000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.comalscp573oYDUX.exe, 00000000.00000003.333507582.000000000525A000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/s-ccp573oYDUX.exe, 00000000.00000003.329395807.0000000005253000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/bcp573oYDUX.exe, 00000000.00000003.330044302.000000000525A000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/_cp573oYDUX.exe, 00000000.00000003.329818359.0000000005259000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown

                                    Contacted IPs

                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs

                                    Public

                                    IPDomainCountryFlagASNASN NameMalicious
                                    87.237.165.78
                                    unknownRussian Federation
                                    49967MTVHGBtrue
                                    79.134.225.43
                                    unknownSwitzerland
                                    6775FINK-TELECOM-SERVICESCHtrue

                                    General Information

                                    Joe Sandbox Version:31.0.0 Emerald
                                    Analysis ID:357426
                                    Start date:24.02.2021
                                    Start time:16:09:26
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 9m 39s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:cp573oYDUX.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:34
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@18/13@12/2
                                    EGA Information:Failed
                                    HDC Information:
                                    • Successful, ratio: 2.9% (good quality ratio 2.1%)
                                    • Quality average: 53.3%
                                    • Quality standard deviation: 40%
                                    HCA Information:
                                    • Successful, ratio: 92%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Found application associated with file extension: .exe
                                    Warnings:
                                    Show All
                                    • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                    • TCP Packets have been reduced to 100
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                    • Excluded IPs from analysis (whitelisted): 52.147.198.201, 104.42.151.234, 23.54.113.53, 13.64.90.137, 52.255.188.83, 51.11.168.160, 52.155.217.156, 23.0.174.187, 23.0.174.185, 20.54.26.129, 51.103.5.159, 23.10.249.25, 23.10.249.26, 95.100.54.203
                                    • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, vip1-par02p.wns.notify.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, db3p-ris-pf-prod-atm.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, a767.dscg3.akamai.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.

                                    Simulations

                                    Behavior and APIs

                                    TimeTypeDescription
                                    16:10:21API Interceptor1x Sleep call for process: cp573oYDUX.exe modified
                                    16:10:37API Interceptor853x Sleep call for process: RegSvcs.exe modified
                                    16:10:38Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" s>$(Arg0)
                                    16:10:38Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                    16:10:40AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe

                                    Joe Sandbox View / Context

                                    IPs

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    87.237.165.78YoWPu2BQzA9FeDd.exeGet hashmaliciousBrowse
                                      M5QDAaK9yM.exeGet hashmaliciousBrowse
                                        TdX45jQWjj.exeGet hashmaliciousBrowse
                                          79.134.225.43YoWPu2BQzA9FeDd.exeGet hashmaliciousBrowse
                                            TdX45jQWjj.exeGet hashmaliciousBrowse
                                              JfRbEbUkpV39K4L.exeGet hashmaliciousBrowse
                                                Dachser Consulta de cliente saliente no. 000150849 - SKBMT03082020-0012-IMG0149.exeGet hashmaliciousBrowse
                                                  290453721.xlsGet hashmaliciousBrowse
                                                    nUo0FukkVO.xlsGet hashmaliciousBrowse

                                                      Domains

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      strongodss.ddns.netYoWPu2BQzA9FeDd.exeGet hashmaliciousBrowse
                                                      • 87.237.165.78
                                                      M5QDAaK9yM.exeGet hashmaliciousBrowse
                                                      • 87.237.165.78
                                                      TdX45jQWjj.exeGet hashmaliciousBrowse
                                                      • 87.237.165.78

                                                      ASN

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      MTVHGBYoWPu2BQzA9FeDd.exeGet hashmaliciousBrowse
                                                      • 87.237.165.78
                                                      M5QDAaK9yM.exeGet hashmaliciousBrowse
                                                      • 87.237.165.78
                                                      TdX45jQWjj.exeGet hashmaliciousBrowse
                                                      • 87.237.165.78
                                                      QUOTATION 19 01 2021.exeGet hashmaliciousBrowse
                                                      • 87.237.165.162
                                                      FINK-TELECOM-SERVICESCHYoWPu2BQzA9FeDd.exeGet hashmaliciousBrowse
                                                      • 79.134.225.43
                                                      xF7GogN7tM.exeGet hashmaliciousBrowse
                                                      • 79.134.225.120
                                                      TZgGVyMJYF.exeGet hashmaliciousBrowse
                                                      • 79.134.225.74
                                                      ilpbALnKbE.exeGet hashmaliciousBrowse
                                                      • 79.134.225.103
                                                      Documents.exeGet hashmaliciousBrowse
                                                      • 79.134.225.87
                                                      SWcNyi2YBj.exeGet hashmaliciousBrowse
                                                      • 79.134.225.103
                                                      Confirmation Transfer Note Ref Number0002636.exeGet hashmaliciousBrowse
                                                      • 79.134.225.8
                                                      TdX45jQWjj.exeGet hashmaliciousBrowse
                                                      • 79.134.225.43
                                                      e92b274943f4a3a557881ee0dd57772d.exeGet hashmaliciousBrowse
                                                      • 79.134.225.105
                                                      WxTm2cWLHF.exeGet hashmaliciousBrowse
                                                      • 79.134.225.71
                                                      Payment Confirmation.exeGet hashmaliciousBrowse
                                                      • 79.134.225.30
                                                      rjHlt1zz28.exeGet hashmaliciousBrowse
                                                      • 79.134.225.49
                                                      Deadly Variants of Covid 19.docGet hashmaliciousBrowse
                                                      • 79.134.225.49
                                                      document.exeGet hashmaliciousBrowse
                                                      • 79.134.225.122
                                                      5293ea9467ea45e928620a5ed74440f5.exeGet hashmaliciousBrowse
                                                      • 79.134.225.105
                                                      f1a14e6352036833f1c109e1bb2934f2.exeGet hashmaliciousBrowse
                                                      • 79.134.225.105
                                                      256ec8f8f67b59c5e085b0bb63afcd13.exeGet hashmaliciousBrowse
                                                      • 79.134.225.105
                                                      JOIN.exeGet hashmaliciousBrowse
                                                      • 79.134.225.30
                                                      Delivery pdf.exeGet hashmaliciousBrowse
                                                      • 79.134.225.25
                                                      d88e07467ddcf9e3b19fa972b9f000d1.exeGet hashmaliciousBrowse
                                                      • 79.134.225.105

                                                      JA3 Fingerprints

                                                      No context

                                                      Dropped Files

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exereceipt.exeGet hashmaliciousBrowse
                                                        YoWPu2BQzA9FeDd.exeGet hashmaliciousBrowse
                                                          M5QDAaK9yM.exeGet hashmaliciousBrowse
                                                            oMWv1Zof2y.exeGet hashmaliciousBrowse
                                                              TdX45jQWjj.exeGet hashmaliciousBrowse
                                                                QTxFuxF5NQ.exeGet hashmaliciousBrowse
                                                                  a34b93ef-dea2-45f8-a5bf-4f6b0b5291c7.exeGet hashmaliciousBrowse
                                                                    3fcd8c19-af88-4cd9-87e7-0bfea1de01a1.exeGet hashmaliciousBrowse
                                                                      Vietnam Order.exeGet hashmaliciousBrowse
                                                                        Dhl Shipping Document.exeGet hashmaliciousBrowse
                                                                          PO-WJO-001, pdf.exeGet hashmaliciousBrowse
                                                                            byWuWAR5FD.exeGet hashmaliciousBrowse
                                                                              parcel_images.exeGet hashmaliciousBrowse
                                                                                0712020.exeGet hashmaliciousBrowse
                                                                                  JfRbEbUkpV39K4L.exeGet hashmaliciousBrowse
                                                                                    DECEMBER QUOTATION REQUEST FOR FR12007POH0008_PO0000143_ETQ.exeGet hashmaliciousBrowse
                                                                                      DECEMBER QUOTATION REQUEST FOR FR12007POH0008_PO0000143_ETQ.exeGet hashmaliciousBrowse
                                                                                        zC3edqmNNt.exeGet hashmaliciousBrowse
                                                                                          Shipping Document.pdf..exeGet hashmaliciousBrowse
                                                                                            PPR & CPR_HEA_DECEMBER 4 2020.exeGet hashmaliciousBrowse

                                                                                              Created / dropped Files

                                                                                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                              File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):32768
                                                                                              Entropy (8bit):3.7515815714465193
                                                                                              Encrypted:false
                                                                                              SSDEEP:384:BOj9Y8/gS7SDriLGKq1MHR5U4Ag6ihJSxUCR1rgCPKabK2t0X5P7DZ+JgWSW72uw:B+gSAdN1MH3HAFRJngW2u
                                                                                              MD5:71369277D09DA0830C8C59F9E22BB23A
                                                                                              SHA1:37F9781314F0F6B7E9CB529A573F2B1C8DE9E93F
                                                                                              SHA-256:D4527B7AD2FC4778CC5BE8709C95AEA44EAC0568B367EE14F7357D72898C3698
                                                                                              SHA-512:2F470383E3C796C4CF212EC280854DBB9E7E8C8010CE6857E58F8E7066D7516B7CD7039BC5C0F547E1F5C7F9F2287869ADFFB2869800B08B2982A88BE96E9FB7
                                                                                              Malicious:false
                                                                                              Antivirus:
                                                                                              • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Joe Sandbox View:
                                                                                              • Filename: receipt.exe, Detection: malicious, Browse
                                                                                              • Filename: YoWPu2BQzA9FeDd.exe, Detection: malicious, Browse
                                                                                              • Filename: M5QDAaK9yM.exe, Detection: malicious, Browse
                                                                                              • Filename: oMWv1Zof2y.exe, Detection: malicious, Browse
                                                                                              • Filename: TdX45jQWjj.exe, Detection: malicious, Browse
                                                                                              • Filename: QTxFuxF5NQ.exe, Detection: malicious, Browse
                                                                                              • Filename: a34b93ef-dea2-45f8-a5bf-4f6b0b5291c7.exe, Detection: malicious, Browse
                                                                                              • Filename: 3fcd8c19-af88-4cd9-87e7-0bfea1de01a1.exe, Detection: malicious, Browse
                                                                                              • Filename: Vietnam Order.exe, Detection: malicious, Browse
                                                                                              • Filename: Dhl Shipping Document.exe, Detection: malicious, Browse
                                                                                              • Filename: PO-WJO-001, pdf.exe, Detection: malicious, Browse
                                                                                              • Filename: byWuWAR5FD.exe, Detection: malicious, Browse
                                                                                              • Filename: parcel_images.exe, Detection: malicious, Browse
                                                                                              • Filename: 0712020.exe, Detection: malicious, Browse
                                                                                              • Filename: JfRbEbUkpV39K4L.exe, Detection: malicious, Browse
                                                                                              • Filename: DECEMBER QUOTATION REQUEST FOR FR12007POH0008_PO0000143_ETQ.exe, Detection: malicious, Browse
                                                                                              • Filename: DECEMBER QUOTATION REQUEST FOR FR12007POH0008_PO0000143_ETQ.exe, Detection: malicious, Browse
                                                                                              • Filename: zC3edqmNNt.exe, Detection: malicious, Browse
                                                                                              • Filename: Shipping Document.pdf..exe, Detection: malicious, Browse
                                                                                              • Filename: PPR & CPR_HEA_DECEMBER 4 2020.exe, Detection: malicious, Browse
                                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{Z.................P... .......k... ........@.. ...............................[....@..................................k..K................................... k............................................... ............... ..H............text....K... ...P.................. ..`.rsrc................`..............@..@.reloc...............p..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\RegSvcs.exe.log
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:modified
                                                                                              Size (bytes):120
                                                                                              Entropy (8bit):5.016405576253028
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:QHXMKaoWglAFXMWA2yTMGfsbNXLVd49Am12MFuAvOAsDeieVyn:Q3LawlAFXMWTyAGCFLIP12MUAvvrs
                                                                                              MD5:50DEC1858E13F033E6DCA3CBFAD5E8DE
                                                                                              SHA1:79AE1E9131B0FAF215B499D2F7B4C595AA120925
                                                                                              SHA-256:14A557E226E3BA8620BB3A70035E1E316F1E9FB5C9E8F74C07110EE90B8D8AE4
                                                                                              SHA-512:1BD73338DF685A5B57B0546E102ECFDEE65800410D6F77845E50456AC70DE72929088AF19B59647F01CBA7A5ACFB399C52D9EF2402A9451366586862EF88E7BF
                                                                                              Malicious:false
                                                                                              Preview: 1,"fusion","GAC",0..2,"System.EnterpriseServices, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\cp573oYDUX.exe.log
                                                                                              Process:C:\Users\user\Desktop\cp573oYDUX.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):655
                                                                                              Entropy (8bit):5.273171405160065
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9t0U2WUXBQav:MLF20NaL329hJ5g522rWz2p29XBT
                                                                                              MD5:2703120C370FBB4A8BA08C6D1754039E
                                                                                              SHA1:EC0DB47BF00A4A828F796147619386C0BBEA66A1
                                                                                              SHA-256:F95566974BC44F3A757CAFB1456D185D8F333AC84775089DE18310B90C18B1BC
                                                                                              SHA-512:BC05A2A1BE5B122FC6D3DEA66EF4258522F13351B9754378395AAD019631E312CFD3BC990F3E3D5C7BB0BDBA1EAD54A2B34A96DEE2FCCD703721E98F6192ED48
                                                                                              Malicious:true
                                                                                              Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\4de99804c29261edb63c93616550f034\System.Management.ni.dll",0..
                                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                                                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:modified
                                                                                              Size (bytes):120
                                                                                              Entropy (8bit):5.016405576253028
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:QHXMKaoWglAFXMWA2yTMGfsbNXLVd49Am12MFuAvOAsDeieVyn:Q3LawlAFXMWTyAGCFLIP12MUAvvrs
                                                                                              MD5:50DEC1858E13F033E6DCA3CBFAD5E8DE
                                                                                              SHA1:79AE1E9131B0FAF215B499D2F7B4C595AA120925
                                                                                              SHA-256:14A557E226E3BA8620BB3A70035E1E316F1E9FB5C9E8F74C07110EE90B8D8AE4
                                                                                              SHA-512:1BD73338DF685A5B57B0546E102ECFDEE65800410D6F77845E50456AC70DE72929088AF19B59647F01CBA7A5ACFB399C52D9EF2402A9451366586862EF88E7BF
                                                                                              Malicious:false
                                                                                              Preview: 1,"fusion","GAC",0..2,"System.EnterpriseServices, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                              C:\Users\user\AppData\Local\Temp\tmp53F8.tmp
                                                                                              Process:C:\Users\user\Desktop\cp573oYDUX.exe
                                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):1657
                                                                                              Entropy (8bit):5.169379230727161
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB3yPtn:cbha7JlNQV/rydbz9I3YODOLNdq3a
                                                                                              MD5:441C63E7DAD6297B2955622DAB7933C3
                                                                                              SHA1:51158143E133CBCD60214C98416436E6E64344EA
                                                                                              SHA-256:86B3D194F04436CA2A2AF48AD2670ED72F5CAC647A95323B9A8965E0172D7749
                                                                                              SHA-512:D4A89A81B39D43A15F461978D59558C3D8367C9A518A312D0FE26417152F077B9CF3E53273968BDC97224EF2C518CD2CD8A9B6D235D29545149CC70BD186B847
                                                                                              Malicious:true
                                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
                                                                                              C:\Users\user\AppData\Local\Temp\tmpFC43.tmp
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):1320
                                                                                              Entropy (8bit):5.135021273392143
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mn4xtn:cbk4oL600QydbQxIYODOLedq3Z4j
                                                                                              MD5:40B11EF601FB28F9B2E69D36857BF2EC
                                                                                              SHA1:B6454020AD2CEED193F4792B77001D0BD741B370
                                                                                              SHA-256:C51E12D18CC664425F6711D8AE2507068884C7057092CFA11884100E1E9D49E1
                                                                                              SHA-512:E3C5BCC714CBFCA4B8058DDCDDF231DCEFA69C15881CE3F8123E59ED45CFB5DA052B56E1945DCF8DC7F800D62F9A4EECB82BCA69A66A1530787AEFFEB15E2BD5
                                                                                              Malicious:false
                                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                              C:\Users\user\AppData\Local\Temp\tmpFF61.tmp
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):1310
                                                                                              Entropy (8bit):5.109425792877704
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                                                              MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                                                              SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                                                              SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                                                              SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                                                              Malicious:false
                                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):8
                                                                                              Entropy (8bit):3.0
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:PajVP:ijVP
                                                                                              MD5:65075989286889C893451A913787CFA5
                                                                                              SHA1:8FDFC75DD6A78C5D386915B78D732610065955FB
                                                                                              SHA-256:59F0476D7901FADD5876D37ACFB8D8FA33FDB8279CA4F9B0FA44827C9FDE5B88
                                                                                              SHA-512:C69DA3E0C0B01DF26EE2622B0683585FF4C3D318C718576351586571708AD5203D4825C8C84DB6137C3ACD5B94EA76F802B83A0B1956B88D9D14EA254A46AE02
                                                                                              Malicious:true
                                                                                              Preview: ...!..H
                                                                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):57
                                                                                              Entropy (8bit):4.795707286467131
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:oMty8WbSX/MNn:oMLWus
                                                                                              MD5:D685103573539B7E9FDBF5F1D7DD96CE
                                                                                              SHA1:4B2FE6B5C0B37954B314FCAEE1F12237A9B02D07
                                                                                              SHA-256:D78BC23B0CA3EDDF52D56AB85CDC30A71B3756569CB32AA2F6C28DBC23C76E8E
                                                                                              SHA-512:17769A5944E8929323A34269ABEEF0861D5C6799B0A27F5545FBFADC80E5AB684A471AD6F6A7FC623002385154EA89DE94013051E09120AB94362E542AB0F1DD
                                                                                              Malicious:false
                                                                                              Preview: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                              C:\Users\user\AppData\Roaming\eVEWVTvFLGVU.exe
                                                                                              Process:C:\Users\user\Desktop\cp573oYDUX.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):793600
                                                                                              Entropy (8bit):7.943634916057093
                                                                                              Encrypted:false
                                                                                              SSDEEP:12288:ZEA3LLUEMjhvUbJG16KfU32GOK2F5WRPVba0G/JZgC498Fj31Q2QuUmz:bL0iG16KfYrOK26RPZaA2dFFT
                                                                                              MD5:33CF3AF09D2A1789A2BBAD009A43EDD5
                                                                                              SHA1:FFE606ADDD5694451511DD347BBC85A404328C9D
                                                                                              SHA-256:8DA32EA516FEB3BC471BA01ED18CB0ACA1A9F39966C86CA4624DD2CEA2E226CD
                                                                                              SHA-512:9534E6EC15F7D1C237E254A3DAC79C7E44CC4C7989F3DBB8A4F0B682A3F3CFBBD46E6DDDFFA0E2A7E6BBD3E2B74389492559A8AD89FED85309CB848D5A1F60CB
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              • Antivirus: ReversingLabs, Detection: 31%
                                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?.5`..............0..............0... ...@....@.. ....................................@..................................0..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................0......H.......Ho...2......4...(...X...........................................&.(......*...0..9........~.........,".r...p.....(....o....s............~.....+..*....0...........~.....+..*".......*.0..!........(....r!..p~....o......t.....+..*....0..!........(....r1..p~....o......t.....+..*....0...........r5..p.+..*..0...........rA..p.+..*".(.....*^..}.....(.......(%....**...(.....*..0..;........rO..pr...p.(...........,..(......+..s......o......( .....*..0..I........r...pr...p.(.......
                                                                                              \Device\ConDrv
                                                                                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):1145
                                                                                              Entropy (8bit):4.462201512373672
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:zKLXkzPDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0zPDQntKKH1MqJC
                                                                                              MD5:46EBEB88876A00A52CC37B1F8E0D0438
                                                                                              SHA1:5E5DB352F964E5F398301662FF558BD905798A65
                                                                                              SHA-256:D65BD5A6CC112838AFE8FA70BF61FD13C1313BCE3EE3E76C50E454D7B581238B
                                                                                              SHA-512:E713E6F304A469FB71235C598BC7E2C6F8458ABC61DAF3D1F364F66579CAFA4A7F3023E585BDA552FB400009E7805A8CA0311A50D5EDC9C2AD2D067772A071BE
                                                                                              Malicious:false
                                                                                              Preview: Microsoft (R) .NET Framework Services Installation Utility Version 2.0.50727.8922..Copyright (c) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output...

                                                                                              Static File Info

                                                                                              General

                                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Entropy (8bit):7.943634916057093
                                                                                              TrID:
                                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                              • DOS Executable Generic (2002/1) 0.01%
                                                                                              File name:cp573oYDUX.exe
                                                                                              File size:793600
                                                                                              MD5:33cf3af09d2a1789a2bbad009a43edd5
                                                                                              SHA1:ffe606addd5694451511dd347bbc85a404328c9d
                                                                                              SHA256:8da32ea516feb3bc471ba01ed18cb0aca1a9f39966c86ca4624dd2cea2e226cd
                                                                                              SHA512:9534e6ec15f7d1c237e254a3dac79c7e44cc4c7989f3dbb8a4f0b682a3f3cfbbd46e6dddffa0e2a7e6bbd3e2b74389492559a8ad89fed85309cb848d5a1f60cb
                                                                                              SSDEEP:12288:ZEA3LLUEMjhvUbJG16KfU32GOK2F5WRPVba0G/JZgC498Fj31Q2QuUmz:bL0iG16KfYrOK26RPZaA2dFFT
                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?.5`..............0..............0... ...@....@.. ....................................@................................

                                                                                              File Icon

                                                                                              Icon Hash:00828e8e8686b000

                                                                                              Static PE Info

                                                                                              General

                                                                                              Entrypoint:0x4c30d2
                                                                                              Entrypoint Section:.text
                                                                                              Digitally signed:false
                                                                                              Imagebase:0x400000
                                                                                              Subsystem:windows gui
                                                                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                              Time Stamp:0x6035BA3F [Wed Feb 24 02:30:23 2021 UTC]
                                                                                              TLS Callbacks:
                                                                                              CLR (.Net) Version:v2.0.50727
                                                                                              OS Version Major:4
                                                                                              OS Version Minor:0
                                                                                              File Version Major:4
                                                                                              File Version Minor:0
                                                                                              Subsystem Version Major:4
                                                                                              Subsystem Version Minor:0
                                                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                              Entrypoint Preview

                                                                                              Instruction
                                                                                              jmp dword ptr [00402000h]
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al

                                                                                              Data Directories

                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xc30800x4f.text
                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x5b4.rsrc
                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xc60000xc.reloc
                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                              Sections

                                                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                              .text0x20000xc10d80xc1200False0.935377477751data7.94883955827IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                              .rsrc0xc40000x5b40x600False0.430989583333data4.18690260245IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .reloc0xc60000xc0x200False0.044921875data0.0940979256627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                              Resources

                                                                                              NameRVASizeTypeLanguageCountry
                                                                                              RT_VERSION0xc40900x324data
                                                                                              RT_MANIFEST0xc43c40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                              Imports

                                                                                              DLLImport
                                                                                              mscoree.dll_CorExeMain

                                                                                              Version Infos

                                                                                              DescriptionData
                                                                                              Translation0x0000 0x04b0
                                                                                              LegalCopyrightCopyright 2016
                                                                                              Assembly Version4.0.0.0
                                                                                              InternalNameCk2rVn.exe
                                                                                              FileVersion4.0.0.0
                                                                                              CompanyName
                                                                                              LegalTrademarks
                                                                                              Comments
                                                                                              ProductNameITP_RMSS
                                                                                              ProductVersion4.0.0.0
                                                                                              FileDescriptionITP_RMSS
                                                                                              OriginalFilenameCk2rVn.exe

                                                                                              Network Behavior

                                                                                              Network Port Distribution

                                                                                              TCP Packets

                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Feb 24, 2021 16:10:38.953803062 CET4972458103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:10:38.982628107 CET581034972487.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:10:39.493839025 CET4972458103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:10:39.523427963 CET581034972487.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:10:40.026274920 CET4972458103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:10:40.055999041 CET581034972487.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:10:44.133502007 CET4972758103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:10:44.162616014 CET581034972787.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:10:44.665113926 CET4972758103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:10:44.692055941 CET581034972787.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:10:45.196480036 CET4972758103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:10:45.223663092 CET581034972787.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:10:49.426067114 CET4972858103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:10:49.453262091 CET581034972887.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:10:49.962439060 CET4972858103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:10:49.989728928 CET581034972887.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:10:50.493711948 CET4972858103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:10:50.523130894 CET581034972887.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:10:54.526827097 CET4972958103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:10:54.562397957 CET581034972979.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:10:55.072269917 CET4972958103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:10:55.104984045 CET581034972979.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:10:55.619213104 CET4972958103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:10:55.651684046 CET581034972979.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:00.457012892 CET4973058103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:11:00.491065025 CET581034973079.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:00.994596004 CET4973058103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:11:01.029591084 CET581034973079.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:01.619633913 CET4973058103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:11:01.652059078 CET581034973079.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:05.996933937 CET4974158103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:11:06.029486895 CET581034974179.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:06.542004108 CET4974158103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:11:06.574748039 CET581034974179.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:07.276410103 CET4974158103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:11:07.309014082 CET581034974179.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:11.628916025 CET4974558103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:11.656161070 CET581034974587.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:12.261209011 CET4974558103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:12.288264990 CET581034974587.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:12.870593071 CET4974558103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:12.898427010 CET581034974587.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:16.972337008 CET4975158103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:17.000792980 CET581034975187.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:17.574356079 CET4975158103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:17.601228952 CET581034975187.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:18.261704922 CET4975158103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:18.291177988 CET581034975187.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:22.386017084 CET4975258103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:22.413485050 CET581034975287.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:22.918452978 CET4975258103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:22.946038961 CET581034975287.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:23.449760914 CET4975258103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:23.476892948 CET581034975287.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:27.628334999 CET4975358103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:11:27.662491083 CET581034975379.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:28.168908119 CET4975358103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:11:28.202835083 CET581034975379.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:28.715854883 CET4975358103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:11:28.750176907 CET581034975379.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:32.796241999 CET4975458103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:11:32.829065084 CET581034975479.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:33.341175079 CET4975458103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:11:33.373945951 CET581034975479.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:33.890563011 CET4975458103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:11:33.924868107 CET581034975479.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:37.953883886 CET4975558103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:11:37.986879110 CET581034975579.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:38.497858047 CET4975558103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:11:38.531111002 CET581034975579.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:39.044795990 CET4975558103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:11:39.077517033 CET581034975579.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:11:43.156795979 CET4975658103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:43.186810017 CET581034975687.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:43.701292992 CET4975658103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:43.728566885 CET581034975687.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:44.232594013 CET4975658103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:44.260241985 CET581034975687.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:48.317481041 CET4976258103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:48.344979048 CET581034976287.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:48.858040094 CET4976258103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:48.885418892 CET581034976287.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:49.389276981 CET4976258103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:49.416731119 CET581034976287.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:53.590868950 CET4976358103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:53.618211031 CET581034976387.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:54.124125957 CET4976358103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:54.152458906 CET581034976387.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:11:54.655369043 CET4976358103192.168.2.687.237.165.78
                                                                                              Feb 24, 2021 16:11:56.654846907 CET581034976387.237.165.78192.168.2.6
                                                                                              Feb 24, 2021 16:12:00.811273098 CET4976458103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:12:00.844180107 CET581034976479.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:12:01.349611998 CET4976458103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:12:01.386795998 CET581034976479.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:12:01.913440943 CET4976458103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:12:01.947032928 CET581034976479.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:12:05.961186886 CET4976658103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:12:05.993784904 CET581034976679.134.225.43192.168.2.6
                                                                                              Feb 24, 2021 16:12:06.506625891 CET4976658103192.168.2.679.134.225.43
                                                                                              Feb 24, 2021 16:12:06.539789915 CET581034976679.134.225.43192.168.2.6

                                                                                              UDP Packets

                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Feb 24, 2021 16:10:07.518027067 CET6379153192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:07.529794931 CET53637918.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:08.229974031 CET6426753192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:08.242146015 CET53642678.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:08.897500038 CET4944853192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:08.910022974 CET53494488.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:09.922713995 CET6034253192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:09.934758902 CET53603428.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:09.958610058 CET6134653192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:09.976557016 CET53613468.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:10.592065096 CET5177453192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:10.604959965 CET53517748.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:11.916075945 CET5602353192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:11.928503036 CET53560238.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:12.923096895 CET5838453192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:12.934818029 CET53583848.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:13.814424992 CET6026153192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:13.828752995 CET53602618.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:14.830136061 CET5606153192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:14.843961000 CET53560618.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:15.931255102 CET5833653192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:15.942899942 CET53583368.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:16.926970005 CET5378153192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:16.939821959 CET53537818.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:18.007355928 CET5406453192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:18.019748926 CET53540648.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:19.094878912 CET5281153192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:19.107601881 CET53528118.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:20.110537052 CET5529953192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:20.125304937 CET53552998.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:20.831885099 CET6374553192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:20.844845057 CET53637458.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:21.523874044 CET5005553192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:21.535721064 CET53500558.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:22.613850117 CET6137453192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:22.626470089 CET53613748.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:38.918437958 CET5033953192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:38.940557003 CET53503398.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:43.555535078 CET6330753192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:43.569211006 CET53633078.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:44.119376898 CET4969453192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:44.131638050 CET53496948.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:10:49.411509037 CET5498253192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:10:49.424482107 CET53549828.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:01.354537010 CET5001053192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:01.367275000 CET53500108.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:01.961107969 CET6371853192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:01.973623037 CET53637188.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:02.452449083 CET6211653192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:02.465662003 CET53621168.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:02.775964975 CET6381653192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:02.793160915 CET5501453192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:02.794636011 CET53638168.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:02.807427883 CET53550148.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:03.064794064 CET6220853192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:03.078361034 CET53622088.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:03.339365005 CET5757453192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:03.354017019 CET53575748.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:03.961036921 CET5181853192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:03.974280119 CET53518188.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:04.277424097 CET5662853192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:04.291400909 CET53566288.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:05.023027897 CET6077853192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:05.034997940 CET53607788.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:06.226900101 CET5379953192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:06.240196943 CET53537998.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:08.062889099 CET5468353192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:08.075159073 CET53546838.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:08.394944906 CET5932953192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:08.408041000 CET53593298.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:11.606597900 CET6402153192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:11.627228975 CET53640218.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:12.298700094 CET5612953192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:12.314606905 CET53561298.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:16.955619097 CET5817753192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:16.970276117 CET53581778.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:22.370347023 CET5070053192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:22.384215117 CET53507008.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:43.134542942 CET5406953192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:43.154480934 CET53540698.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:43.965912104 CET6117853192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:43.979415894 CET53611788.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:44.294032097 CET5701753192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:44.306591988 CET53570178.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:46.697841883 CET5632753192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:46.715770006 CET53563278.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:48.302930117 CET5024353192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:48.315598965 CET53502438.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:11:53.576647997 CET6205553192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:11:53.589582920 CET53620558.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:12:05.182383060 CET6124953192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:12:05.194192886 CET53612498.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:12:16.545772076 CET6525253192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:12:16.559621096 CET53652528.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:12:21.669437885 CET6436753192.168.2.68.8.8.8
                                                                                              Feb 24, 2021 16:12:21.681693077 CET53643678.8.8.8192.168.2.6
                                                                                              Feb 24, 2021 16:12:26.796633959 CET5506653192.168.2.68.8.8.8

                                                                                              DNS Queries

                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                              Feb 24, 2021 16:10:38.918437958 CET192.168.2.68.8.8.80xd1eaStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:10:44.119376898 CET192.168.2.68.8.8.80x448dStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:10:49.411509037 CET192.168.2.68.8.8.80x4f17Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:11:11.606597900 CET192.168.2.68.8.8.80xac0bStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:11:16.955619097 CET192.168.2.68.8.8.80xe707Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:11:22.370347023 CET192.168.2.68.8.8.80x9ae5Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:11:43.134542942 CET192.168.2.68.8.8.80xb17Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:11:48.302930117 CET192.168.2.68.8.8.80x6eecStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:11:53.576647997 CET192.168.2.68.8.8.80x2f73Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:12:16.545772076 CET192.168.2.68.8.8.80xadffStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:12:21.669437885 CET192.168.2.68.8.8.80x448Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:12:26.796633959 CET192.168.2.68.8.8.80xa791Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)

                                                                                              DNS Answers

                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                              Feb 24, 2021 16:10:38.940557003 CET8.8.8.8192.168.2.60xd1eaNo error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:10:44.131638050 CET8.8.8.8192.168.2.60x448dNo error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:10:49.424482107 CET8.8.8.8192.168.2.60x4f17No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:11:11.627228975 CET8.8.8.8192.168.2.60xac0bNo error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:11:16.970276117 CET8.8.8.8192.168.2.60xe707No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:11:22.384215117 CET8.8.8.8192.168.2.60x9ae5No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:11:43.154480934 CET8.8.8.8192.168.2.60xb17No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:11:48.315598965 CET8.8.8.8192.168.2.60x6eecNo error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:11:53.589582920 CET8.8.8.8192.168.2.60x2f73No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:12:16.559621096 CET8.8.8.8192.168.2.60xadffNo error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)
                                                                                              Feb 24, 2021 16:12:21.681693077 CET8.8.8.8192.168.2.60x448No error (0)strongodss.ddns.net87.237.165.78A (IP address)IN (0x0001)

                                                                                              Code Manipulations

                                                                                              Statistics

                                                                                              Behavior

                                                                                              Click to jump to process

                                                                                              System Behavior

                                                                                              General

                                                                                              Start time:16:10:14
                                                                                              Start date:24/02/2021
                                                                                              Path:C:\Users\user\Desktop\cp573oYDUX.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:'C:\Users\user\Desktop\cp573oYDUX.exe'
                                                                                              Imagebase:0x7a0000
                                                                                              File size:793600 bytes
                                                                                              MD5 hash:33CF3AF09D2A1789A2BBAD009A43EDD5
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Yara matches:
                                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.373693780.00000000042F3000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.373693780.00000000042F3000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.373693780.00000000042F3000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                              Reputation:low

                                                                                              General

                                                                                              Start time:16:10:33
                                                                                              Start date:24/02/2021
                                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eVEWVTvFLGVU' /XML 'C:\Users\user\AppData\Local\Temp\tmp53F8.tmp'
                                                                                              Imagebase:0x120000
                                                                                              File size:185856 bytes
                                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:16:10:34
                                                                                              Start date:24/02/2021
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff61de10000
                                                                                              File size:625664 bytes
                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:16:10:34
                                                                                              Start date:24/02/2021
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:{path}
                                                                                              Imagebase:0x6c0000
                                                                                              File size:32768 bytes
                                                                                              MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Yara matches:
                                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.600652707.0000000005030000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.600652707.0000000005030000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.594405865.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.594405865.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.594405865.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.599620352.0000000003DA7000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.599620352.0000000003DA7000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.601347713.0000000005990000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.601347713.0000000005990000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.601373463.00000000059A0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.601373463.00000000059A0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.601373463.00000000059A0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              Reputation:moderate

                                                                                              General

                                                                                              Start time:16:10:36
                                                                                              Start date:24/02/2021
                                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpFC43.tmp'
                                                                                              Imagebase:0x120000
                                                                                              File size:185856 bytes
                                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:16:10:36
                                                                                              Start date:24/02/2021
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff61de10000
                                                                                              File size:625664 bytes
                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:16:10:36
                                                                                              Start date:24/02/2021
                                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpFF61.tmp'
                                                                                              Imagebase:0x120000
                                                                                              File size:185856 bytes
                                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:16:10:37
                                                                                              Start date:24/02/2021
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff61de10000
                                                                                              File size:625664 bytes
                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:16:10:38
                                                                                              Start date:24/02/2021
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
                                                                                              Imagebase:0xbe0000
                                                                                              File size:32768 bytes
                                                                                              MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Reputation:moderate

                                                                                              General

                                                                                              Start time:16:10:38
                                                                                              Start date:24/02/2021
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff61de10000
                                                                                              File size:625664 bytes
                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:16:10:38
                                                                                              Start date:24/02/2021
                                                                                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                                                              Imagebase:0xe00000
                                                                                              File size:32768 bytes
                                                                                              MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Antivirus matches:
                                                                                              • Detection: 0%, Metadefender, Browse
                                                                                              • Detection: 0%, ReversingLabs
                                                                                              Reputation:moderate

                                                                                              General

                                                                                              Start time:16:10:39
                                                                                              Start date:24/02/2021
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff61de10000
                                                                                              File size:625664 bytes
                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:16:10:48
                                                                                              Start date:24/02/2021
                                                                                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                                              Imagebase:0xc20000
                                                                                              File size:32768 bytes
                                                                                              MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Reputation:moderate

                                                                                              General

                                                                                              Start time:16:10:49
                                                                                              Start date:24/02/2021
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff61de10000
                                                                                              File size:625664 bytes
                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              Disassembly

                                                                                              Code Analysis

                                                                                              Reset < >