Loading ...

Play interactive tourEdit tour

Analysis Report YfceI5MZX4.exe

Overview

General Information

Sample Name:YfceI5MZX4.exe
Analysis ID:385233
MD5:a3cbeb3e732b11954572b3ee6755242c
SHA1:ebb41b49de8f1b09ea20dabffcfd85b93b68d7f3
SHA256:e006460ad1e34ddbbc28430c2d529a7ee491893c7ae8b6902b2d8d8c56620510
Tags:exeNanoCorenVpnRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • YfceI5MZX4.exe (PID: 6136 cmdline: 'C:\Users\user\Desktop\YfceI5MZX4.exe' MD5: A3CBEB3E732B11954572B3EE6755242C)
    • schtasks.exe (PID: 5564 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp7762.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2908 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 5996 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe MD5: 71369277D09DA0830C8C59F9E22BB23A)
  • dhcpmon.exe (PID: 6464 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 71369277D09DA0830C8C59F9E22BB23A)
    • conhost.exe (PID: 6472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "f57d5a77-8670-45ef-b736-5f3a07b6", "Group": "Addora", "Domain1": "79.134.225.30", "Domain2": "nassiru1155.ddns.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.500274474.0000000003FBB000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000005.00000002.500274474.0000000003FBB000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xf3e5:$a: NanoCore
    • 0xf43e:$a: NanoCore
    • 0xf47b:$a: NanoCore
    • 0xf4f4:$a: NanoCore
    • 0x22b9f:$a: NanoCore
    • 0x22bb4:$a: NanoCore
    • 0x22be9:$a: NanoCore
    • 0x3b66b:$a: NanoCore
    • 0x3b680:$a: NanoCore
    • 0x3b6b5:$a: NanoCore
    • 0xf447:$b: ClientPlugin
    • 0xf484:$b: ClientPlugin
    • 0xfd82:$b: ClientPlugin
    • 0xfd8f:$b: ClientPlugin
    • 0x2295b:$b: ClientPlugin
    • 0x22976:$b: ClientPlugin
    • 0x229a6:$b: ClientPlugin
    • 0x22bbd:$b: ClientPlugin
    • 0x22bf2:$b: ClientPlugin
    • 0x3b427:$b: ClientPlugin
    • 0x3b442:$b: ClientPlugin
    00000005.00000002.492901504.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000005.00000002.492901504.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000005.00000002.492901504.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfcf5:$a: NanoCore
      • 0xfd05:$a: NanoCore
      • 0xff39:$a: NanoCore
      • 0xff4d:$a: NanoCore
      • 0xff8d:$a: NanoCore
      • 0xfd54:$b: ClientPlugin
      • 0xff56:$b: ClientPlugin
      • 0xff96:$b: ClientPlugin
      • 0xfe7b:$c: ProjectData
      • 0x10882:$d: DESCrypto
      • 0x1824e:$e: KeepAlive
      • 0x1623c:$g: LogClientMessage
      • 0x12437:$i: get_Connected
      • 0x10bb8:$j: #=q
      • 0x10be8:$j: #=q
      • 0x10c04:$j: #=q
      • 0x10c34:$j: #=q
      • 0x10c50:$j: #=q
      • 0x10c6c:$j: #=q
      • 0x10c9c:$j: #=q
      • 0x10cb8:$j: #=q
      Click to see the 13 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      0.2.YfceI5MZX4.exe.3b51e28.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x429ad:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x429ea:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      • 0x4651d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0.2.YfceI5MZX4.exe.3b51e28.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x42725:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x429ad:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x43fe6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x43fda:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x44e8b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x4ac42:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      • 0x429d7:$s5: IClientLoggingHost
      0.2.YfceI5MZX4.exe.3b51e28.3.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        0.2.YfceI5MZX4.exe.3b51e28.3.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfef5:$a: NanoCore
        • 0xff05:$a: NanoCore
        • 0x10139:$a: NanoCore
        • 0x1014d:$a: NanoCore
        • 0x1018d:$a: NanoCore
        • 0x42715:$a: NanoCore
        • 0x42725:$a: NanoCore
        • 0x42959:$a: NanoCore
        • 0x4296d:$a: NanoCore
        • 0x429ad:$a: NanoCore
        • 0xff54:$b: ClientPlugin
        • 0x10156:$b: ClientPlugin
        • 0x10196:$b: ClientPlugin
        • 0x42774:$b: ClientPlugin
        • 0x42976:$b: ClientPlugin
        • 0x429b6:$b: ClientPlugin
        • 0x1007b:$c: ProjectData
        • 0x4289b:$c: ProjectData
        • 0x10a82:$d: DESCrypto
        • 0x432a2:$d: DESCrypto
        • 0x1844e:$e: KeepAlive
        5.2.RegSvcs.exe.3fd2a65.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xb184:$x1: NanoCore.ClientPluginHost
        • 0x23c50:$x1: NanoCore.ClientPluginHost
        • 0xb1b1:$x2: IClientNetworkHost
        • 0x23c7d:$x2: IClientNetworkHost
        Click to see the 33 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 5996, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp7762.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp7762.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\YfceI5MZX4.exe' , ParentImage: C:\Users\user\Desktop\YfceI5MZX4.exe, ParentProcessId: 6136, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp7762.tmp', ProcessId: 5564

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000005.00000002.500274474.0000000003FBB000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "f57d5a77-8670-45ef-b736-5f3a07b6", "Group": "Addora", "Domain1": "79.134.225.30", "Domain2": "nassiru1155.ddns.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000005.00000002.500274474.0000000003FBB000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.492901504.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.248677483.0000000003AB9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.502139157.00000000058D0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5996, type: MEMORY
        Source: Yara matchFile source: 0.2.YfceI5MZX4.exe.3b51e28.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fd2a65.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.58d0000.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.58d4629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fc9606.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fce43c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fce43c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.58d0000.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YfceI5MZX4.exe.3b51e28.3.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\gmSlQSien.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: YfceI5MZX4.exeJoe Sandbox ML: detected
        Source: 5.2.RegSvcs.exe.58d0000.9.unpackAvira: Label: TR/NanoCore.fadte
        Source: 5.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: YfceI5MZX4.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: YfceI5MZX4.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: symbols\dll\System.pdb source: RegSvcs.exe, 00000005.00000002.502127000.00000000058CC000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\System.pdbzz source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\dll\System.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: oC:\Windows\System.pdb source: RegSvcs.exe, 00000005.00000002.502127000.00000000058CC000.00000004.00000001.sdmp
        Source: Binary string: System.pdb H source: RegSvcs.exe, 00000005.00000002.502127000.00000000058CC000.00000004.00000001.sdmp
        Source: Binary string: indows\RegSvcs.pdbpdbvcs.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, 00000005.00000003.247448254.0000000001128000.00000004.00000001.sdmp, dhcpmon.exe, dhcpmon.exe.5.dr
        Source: Binary string: C:\Windows\assembly\GA.pdbL\System\2.0.0.0__b77a5c561934e089\System.dll source: RegSvcs.exe, 00000005.00000002.502127000.00000000058CC000.00000004.00000001.sdmp
        Source: Binary string: indows\System.pdbpdbtem.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\symbols\dll\System.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: System.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: mscorrc.pdb source: YfceI5MZX4.exe, 00000000.00000002.253471849.0000000006A00000.00000002.00000001.sdmp, RegSvcs.exe, 00000005.00000002.501899583.00000000055F0000.00000002.00000001.sdmp
        Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: System.pdbSystem.pdbpdbtem.pdbm\2.0.0.0__b77a5c561934e089\System.pdb source: RegSvcs.exe, 00000005.00000002.502127000.00000000058CC000.00000004.00000001.sdmp
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: nassiru1155.ddns.net
        Source: Malware configuration extractorURLs: 79.134.225.30
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: nassiru1155.ddns.net
        Source: global trafficTCP traffic: 192.168.2.5:49699 -> 79.134.225.30:1144
        Source: Joe Sandbox ViewIP Address: 79.134.225.30 79.134.225.30
        Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
        Source: unknownDNS traffic detected: query: nassiru1155.ddns.net replaycode: Name error (3)
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownDNS traffic detected: queries for: nassiru1155.ddns.net
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: YfceI5MZX4.exe, 00000000.00000003.233084984.0000000004D0D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: YfceI5MZX4.exe, 00000000.00000003.245702831.0000000004D00000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
        Source: YfceI5MZX4.exe, 00000000.00000003.245702831.0000000004D00000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comiona=
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: YfceI5MZX4.exe, 00000000.00000003.227190711.0000000004D1B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comX
        Source: YfceI5MZX4.exe, 00000000.00000003.227156723.0000000004D1B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comtem7W
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmp, YfceI5MZX4.exe, 00000000.00000003.228908914.0000000004D3D000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: YfceI5MZX4.exe, 00000000.00000003.229242210.0000000004D04000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: YfceI5MZX4.exe, 00000000.00000003.228931312.0000000004D04000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cne
        Source: YfceI5MZX4.exe, 00000000.00000003.229331040.0000000004D0B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnmf
        Source: YfceI5MZX4.exe, 00000000.00000003.229242210.0000000004D04000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnsof
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: YfceI5MZX4.exe, 00000000.00000003.230882117.0000000004D04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/&t
        Source: YfceI5MZX4.exe, 00000000.00000003.230882117.0000000004D04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/=t
        Source: YfceI5MZX4.exe, 00000000.00000003.230882117.0000000004D04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Lt
        Source: YfceI5MZX4.exe, 00000000.00000003.230882117.0000000004D04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/gt
        Source: YfceI5MZX4.exe, 00000000.00000003.230882117.0000000004D04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: YfceI5MZX4.exe, 00000000.00000003.230882117.0000000004D04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ut
        Source: YfceI5MZX4.exe, 00000000.00000003.230882117.0000000004D04000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/x
        Source: YfceI5MZX4.exe, 00000000.00000003.227000738.0000000004D1B000.00000004.00000001.sdmp, YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: YfceI5MZX4.exe, 00000000.00000003.228260396.0000000004D09000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krAh
        Source: YfceI5MZX4.exe, 00000000.00000003.228260396.0000000004D09000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krN.TTFp
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: YfceI5MZX4.exe, 00000000.00000003.227413461.0000000004D1B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comtn
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
        Source: RegSvcs.exe, 00000005.00000002.500274474.0000000003FBB000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000005.00000002.500274474.0000000003FBB000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.492901504.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.248677483.0000000003AB9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.502139157.00000000058D0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5996, type: MEMORY
        Source: Yara matchFile source: 0.2.YfceI5MZX4.exe.3b51e28.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fd2a65.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.58d0000.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.58d4629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fc9606.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fce43c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fce43c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.58d0000.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YfceI5MZX4.exe.3b51e28.3.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000005.00000002.500274474.0000000003FBB000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.492901504.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000005.00000002.492901504.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.501754781.0000000005470000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.248677483.0000000003AB9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.248677483.0000000003AB9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.502139157.00000000058D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegSvcs.exe PID: 5996, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegSvcs.exe PID: 5996, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.YfceI5MZX4.exe.3b51e28.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.YfceI5MZX4.exe.3b51e28.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.RegSvcs.exe.3fd2a65.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.RegSvcs.exe.58d0000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.RegSvcs.exe.5470000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.RegSvcs.exe.58d4629.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.RegSvcs.exe.3fc9606.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.RegSvcs.exe.3fc9606.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.RegSvcs.exe.2f9139c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.RegSvcs.exe.3fce43c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.RegSvcs.exe.3fce43c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.RegSvcs.exe.58d0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.YfceI5MZX4.exe.3b51e28.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.YfceI5MZX4.exe.3b51e28.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_06A9088E NtQueryInformationProcess,
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_06A909FE NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_06A9086C NtQueryInformationProcess,
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_06A909C3 NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_052A144A NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_052A1428 NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_001685C8
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_00A12E09
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04972E98
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04973ED1
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04972AE8
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_049734E8
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04975985
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_049715D0
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04971148
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04972E87
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_049742A1
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04975AD7
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04972AD9
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04970070
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04970710
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B2F8B0
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B268B8
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B28080
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B240DF
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B24410
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B261D0
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B2D698
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B24EE0
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B27210
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B25261
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B2A3A1
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B29828
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B29819
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B28002
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B24400
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B29DB8
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B29DA9
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B2A1E8
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B28DE8
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B28DD8
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B2A1D8
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B2D930
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B2613B
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B2E940
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B2DED0
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B24ED0
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B25600
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B2AE73
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B29FB0
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B29FAC
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_02A67ABF
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_05183850
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_0518B068
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_05188798
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_05182FA8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_051823A0
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_0518945F
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_05189C40
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_0518306F
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_05189398
        Source: YfceI5MZX4.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: YfceI5MZX4.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: YfceI5MZX4.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: gmSlQSien.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: gmSlQSien.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: gmSlQSien.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: YfceI5MZX4.exeBinary or memory string: OriginalFilename vs YfceI5MZX4.exe
        Source: YfceI5MZX4.exe, 00000000.00000002.255010686.0000000006E30000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll" vs YfceI5MZX4.exe
        Source: YfceI5MZX4.exe, 00000000.00000002.253471849.0000000006A00000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs YfceI5MZX4.exe
        Source: YfceI5MZX4.exe, 00000000.00000002.255623504.0000000007370000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs YfceI5MZX4.exe
        Source: YfceI5MZX4.exe, 00000000.00000002.245810299.0000000000162000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameHostProtectionAttribute.exe> vs YfceI5MZX4.exe
        Source: YfceI5MZX4.exe, 00000000.00000002.247073600.0000000002911000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll2 vs YfceI5MZX4.exe
        Source: YfceI5MZX4.exe, 00000000.00000002.255836419.0000000007460000.00000002.00000001.sdmpBinary or memory string: originalfilename vs YfceI5MZX4.exe
        Source: YfceI5MZX4.exe, 00000000.00000002.255836419.0000000007460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs YfceI5MZX4.exe
        Source: YfceI5MZX4.exeBinary or memory string: OriginalFilenameHostProtectionAttribute.exe> vs YfceI5MZX4.exe
        Source: YfceI5MZX4.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000005.00000002.500274474.0000000003FBB000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.492901504.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.492901504.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.501754781.0000000005470000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.501754781.0000000005470000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000000.00000002.248677483.0000000003AB9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.248677483.0000000003AB9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.502139157.00000000058D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.502139157.00000000058D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: Process Memory Space: RegSvcs.exe PID: 5996, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: RegSvcs.exe PID: 5996, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.YfceI5MZX4.exe.3b51e28.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.YfceI5MZX4.exe.3b51e28.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.YfceI5MZX4.exe.3b51e28.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.RegSvcs.exe.3fd2a65.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.RegSvcs.exe.3fd2a65.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.RegSvcs.exe.58d0000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.RegSvcs.exe.58d0000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.RegSvcs.exe.5470000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.RegSvcs.exe.5470000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.RegSvcs.exe.58d4629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.RegSvcs.exe.58d4629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.RegSvcs.exe.3fc9606.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.RegSvcs.exe.3fc9606.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.RegSvcs.exe.3fc9606.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.RegSvcs.exe.2f9139c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.RegSvcs.exe.2f9139c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.RegSvcs.exe.3fce43c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.RegSvcs.exe.3fce43c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.RegSvcs.exe.3fce43c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.RegSvcs.exe.3fce43c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.RegSvcs.exe.58d0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.RegSvcs.exe.58d0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.YfceI5MZX4.exe.3b51e28.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.YfceI5MZX4.exe.3b51e28.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.YfceI5MZX4.exe.3b51e28.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: YfceI5MZX4.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: gmSlQSien.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 5.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 5.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 5.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@8/8@9/1
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_06A9053E AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_06A90507 AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_052A10DA AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_052A10A3 AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeFile created: C:\Users\user\AppData\Roaming\gmSlQSien.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2908:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6472:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{f57d5a77-8670-45ef-b736-5f3a07b68725}
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeMutant created: \Sessions\1\BaseNamedObjects\NFKnYlgkNzhyGKSdXXNN
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7762.tmpJump to behavior
        Source: YfceI5MZX4.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: Select * from UnmanagedMemoryStreamWrapper WHERE modelo=@modelo;?
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel5Erro ao listar Banco sql-UnmanagedMemoryStreamWrapper.INSERT INTO Aluguel VALUES(@clienteID, @data);
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: INSERT INTO UnmanagedMemoryStreamWrapper VALUES(@modelo, @fabricante, @ano, @cor);
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeFile read: C:\Users\user\Desktop\YfceI5MZX4.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\YfceI5MZX4.exe 'C:\Users\user\Desktop\YfceI5MZX4.exe'
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp7762.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp7762.tmp'
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: YfceI5MZX4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: YfceI5MZX4.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: symbols\dll\System.pdb source: RegSvcs.exe, 00000005.00000002.502127000.00000000058CC000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\System.pdbzz source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\dll\System.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: oC:\Windows\System.pdb source: RegSvcs.exe, 00000005.00000002.502127000.00000000058CC000.00000004.00000001.sdmp
        Source: Binary string: System.pdb H source: RegSvcs.exe, 00000005.00000002.502127000.00000000058CC000.00000004.00000001.sdmp
        Source: Binary string: indows\RegSvcs.pdbpdbvcs.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, 00000005.00000003.247448254.0000000001128000.00000004.00000001.sdmp, dhcpmon.exe, dhcpmon.exe.5.dr
        Source: Binary string: C:\Windows\assembly\GA.pdbL\System\2.0.0.0__b77a5c561934e089\System.dll source: RegSvcs.exe, 00000005.00000002.502127000.00000000058CC000.00000004.00000001.sdmp
        Source: Binary string: indows\System.pdbpdbtem.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\symbols\dll\System.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: System.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: mscorrc.pdb source: YfceI5MZX4.exe, 00000000.00000002.253471849.0000000006A00000.00000002.00000001.sdmp, RegSvcs.exe, 00000005.00000002.501899583.00000000055F0000.00000002.00000001.sdmp
        Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: RegSvcs.exe, 00000005.00000002.496361214.0000000002B05000.00000004.00000040.sdmp
        Source: Binary string: System.pdbSystem.pdbpdbtem.pdbm\2.0.0.0__b77a5c561934e089\System.pdb source: RegSvcs.exe, 00000005.00000002.502127000.00000000058CC000.00000004.00000001.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 5.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 5.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_00166A9F push es; iretd
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_0016A2BC push es; retf
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_0016A0AC push es; retf
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_0016A274 push es; retf
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_0016A2FE push es; retf
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B2D4BB push ebx; iretd
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B2C1C5 push edi; retf
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B2C11D push CCFFFFFEh; ret
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B2CA7F push esp; retf
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeCode function: 0_2_04B2D3E2 push eax; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_02A69D74 push eax; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_02A69D78 pushad ; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_02A681DB push eax; iretd
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_02C30D47 push cs; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_02C30D87 push cs; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_02C30D13 push cs; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_02C30D2B push cs; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_02C30D33 push cs; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_0518902D push ebx; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_05186C50 push esp; ret
        Source: initial sampleStatic PE information: section name: .text entropy: 7.9540154939
        Source: initial sampleStatic PE information: section name: .text entropy: 7.9540154939
        Source: 5.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 5.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeFile created: C:\Users\user\AppData\Roaming\gmSlQSien.exeJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp7762.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: YfceI5MZX4.exe PID: 6136, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: threadDelayed 663
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: foregroundWindowGot 937
        Source: C:\Users\user\Desktop\YfceI5MZX4.exe TID: 4508Thread sleep time: -100892s >= -30000s
        Source: C:\Users\user\Desktop\YfceI5MZX4.exe TID: 2964Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6524Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_052A0D66 GetSystemInfo,
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeThread delayed: delay time: 100892
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: RegSvcs.exe, 00000005.00000002.502606412.00000000062B0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
        Source: RegSvcs.exe, 00000005.00000002.494732255.00000000010CA000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll%
        Source: RegSvcs.exe, 00000005.00000002.494732255.00000000010CA000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: RegSvcs.exe, 00000005.00000002.502606412.00000000062B0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: RegSvcs.exe, 00000005.00000002.502606412.00000000062B0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: YfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: RegSvcs.exe, 00000005.00000002.502606412.00000000062B0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Allocates memory in foreign processesShow sources
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 protect: page execute and read and write
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 402000
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 420000
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 422000
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: B23008
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp7762.tmp'
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        Source: RegSvcs.exe, 00000005.00000002.499074335.000000000303E000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: RegSvcs.exe, 00000005.00000002.495703857.0000000001650000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: RegSvcs.exe, 00000005.00000002.495703857.0000000001650000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: RegSvcs.exe, 00000005.00000002.495703857.0000000001650000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
        Source: RegSvcs.exe, 00000005.00000003.313582411.000000000118E000.00000004.00000001.sdmpBinary or memory string: Program Managerx8
        Source: RegSvcs.exe, 00000005.00000002.494732255.00000000010CA000.00000004.00000020.sdmpBinary or memory string: Program Managertb
        Source: RegSvcs.exe, 00000005.00000002.495703857.0000000001650000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
        Source: RegSvcs.exe, 00000005.00000002.495392948.000000000117C000.00000004.00000020.sdmpBinary or memory string: Program Managerknown.
        Source: RegSvcs.exe, 00000005.00000002.495703857.0000000001650000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: RegSvcs.exe, 00000005.00000002.494732255.00000000010CA000.00000004.00000020.sdmpBinary or memory string: Program Manager (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Users\user\Desktop\YfceI5MZX4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000005.00000002.500274474.0000000003FBB000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.492901504.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.248677483.0000000003AB9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.502139157.00000000058D0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5996, type: MEMORY
        Source: Yara matchFile source: 0.2.YfceI5MZX4.exe.3b51e28.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fd2a65.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.58d0000.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.58d4629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fc9606.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fce43c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fce43c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.58d0000.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YfceI5MZX4.exe.3b51e28.3.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: RegSvcs.exe, 00000005.00000002.500274474.0000000003FBB000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000005.00000002.500274474.0000000003FBB000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000005.00000002.500274474.0000000003FBB000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.492901504.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.248677483.0000000003AB9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.502139157.00000000058D0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5996, type: MEMORY
        Source: Yara matchFile source: 0.2.YfceI5MZX4.exe.3b51e28.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fd2a65.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.58d0000.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.58d4629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fc9606.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fce43c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.3fce43c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.58d0000.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.YfceI5MZX4.exe.3b51e28.3.unpack, type: UNPACKEDPE
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_052A256E bind,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 5_2_052A253B bind,

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Access Token Manipulation1Masquerading2Input Capture11Security Software Discovery111Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection312Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection312LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncSystem Information Discovery13Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobObfuscated Files or Information3Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing13/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 385233 Sample: YfceI5MZX4.exe Startdate: 12/04/2021 Architecture: WINDOWS Score: 100 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 Sigma detected: Scheduled temp file as task from temp location 2->44 46 10 other signatures 2->46 7 YfceI5MZX4.exe 7 2->7         started        11 dhcpmon.exe 4 2->11         started        process3 file4 24 C:\Users\user\AppData\Roaming\gmSlQSien.exe, PE32 7->24 dropped 26 C:\Users\...\gmSlQSien.exe:Zone.Identifier, ASCII 7->26 dropped 28 C:\Users\user\AppData\Local\...\tmp7762.tmp, XML 7->28 dropped 30 C:\Users\user\AppData\...\YfceI5MZX4.exe.log, ASCII 7->30 dropped 48 Uses schtasks.exe or at.exe to add and modify task schedules 7->48 50 Writes to foreign memory regions 7->50 52 Allocates memory in foreign processes 7->52 54 Injects a PE file into a foreign processes 7->54 13 RegSvcs.exe 1 10 7->13         started        18 schtasks.exe 1 7->18         started        20 conhost.exe 11->20         started        signatures5 process6 dnsIp7 36 79.134.225.30, 1144 FINK-TELECOM-SERVICESCH Switzerland 13->36 38 nassiru1155.ddns.net 13->38 32 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 13->32 dropped 34 C:\Program Files (x86)\...\dhcpmon.exe, PE32 13->34 dropped 56 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->56 22 conhost.exe 18->22         started        file8 signatures9 process10

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        YfceI5MZX4.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\gmSlQSien.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        5.2.RegSvcs.exe.58d0000.9.unpack100%AviraTR/NanoCore.fadteDownload File
        5.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        nassiru1155.ddns.net0%Avira URL Cloudsafe
        http://www.sandoll.co.krN.TTFp0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.sandoll.co.krAh0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/&t0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/=t0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/ut0%Avira URL Cloudsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.tiro.comtn0%Avira URL Cloudsafe
        79.134.225.300%Avira URL Cloudsafe
        http://www.fonts.comX0%URL Reputationsafe
        http://www.fonts.comX0%URL Reputationsafe
        http://www.fonts.comX0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Lt0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/x0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/x0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/x0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/gt0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.fonts.comtem7W0%Avira URL Cloudsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.founder.com.cn/cnmf0%Avira URL Cloudsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.founder.com.cn/cne0%Avira URL Cloudsafe
        http://www.fontbureau.comiona=0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnsof0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        nassiru1155.ddns.net
        unknown
        unknowntrue
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          nassiru1155.ddns.nettrue
          • Avira URL Cloud: safe
          unknown
          79.134.225.30true
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
            high
            http://www.fontbureau.comYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
              high
              http://www.fontbureau.com/designersGYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                high
                http://www.sandoll.co.krN.TTFpYfceI5MZX4.exe, 00000000.00000003.228260396.0000000004D09000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designers/?YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                    high
                    http://www.sandoll.co.krAhYfceI5MZX4.exe, 00000000.00000003.228260396.0000000004D09000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/&tYfceI5MZX4.exe, 00000000.00000003.230882117.0000000004D04000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/=tYfceI5MZX4.exe, 00000000.00000003.230882117.0000000004D04000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.tiro.comYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersYfceI5MZX4.exe, 00000000.00000003.233084984.0000000004D0D000.00000004.00000001.sdmpfalse
                      high
                      http://www.goodfont.co.krYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/YfceI5MZX4.exe, 00000000.00000003.230882117.0000000004D04000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/utYfceI5MZX4.exe, 00000000.00000003.230882117.0000000004D04000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.comaYfceI5MZX4.exe, 00000000.00000003.245702831.0000000004D00000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.tiro.comtnYfceI5MZX4.exe, 00000000.00000003.227413461.0000000004D1B000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fonts.comXYfceI5MZX4.exe, 00000000.00000003.227190711.0000000004D1B000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssYfceI5MZX4.exe, 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmpfalse
                        high
                        http://www.carterandcone.comlYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comYfceI5MZX4.exe, 00000000.00000003.227000738.0000000004D1B000.00000004.00000001.sdmp, YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/YfceI5MZX4.exe, 00000000.00000003.229242210.0000000004D04000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cTheYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/LtYfceI5MZX4.exe, 00000000.00000003.230882117.0000000004D04000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmp, YfceI5MZX4.exe, 00000000.00000003.228908914.0000000004D3D000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/xYfceI5MZX4.exe, 00000000.00000003.230882117.0000000004D04000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/gtYfceI5MZX4.exe, 00000000.00000003.230882117.0000000004D04000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8YfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                              high
                              http://www.fonts.comtem7WYfceI5MZX4.exe, 00000000.00000003.227156723.0000000004D1B000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fonts.comYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                                high
                                http://www.sandoll.co.krYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cnmfYfceI5MZX4.exe, 00000000.00000003.229331040.0000000004D0B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.urwpp.deDPleaseYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.sakkal.comYfceI5MZX4.exe, 00000000.00000002.252311067.0000000006042000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cneYfceI5MZX4.exe, 00000000.00000003.228931312.0000000004D04000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.comiona=YfceI5MZX4.exe, 00000000.00000003.245702831.0000000004D00000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.founder.com.cn/cnsofYfceI5MZX4.exe, 00000000.00000003.229242210.0000000004D04000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown

                                Contacted IPs

                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs

                                Public

                                IPDomainCountryFlagASNASN NameMalicious
                                79.134.225.30
                                unknownSwitzerland
                                6775FINK-TELECOM-SERVICESCHtrue

                                General Information

                                Joe Sandbox Version:31.0.0 Emerald
                                Analysis ID:385233
                                Start date:12.04.2021
                                Start time:08:41:27
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 8m 34s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:YfceI5MZX4.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:29
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@8/8@9/1
                                EGA Information:Failed
                                HDC Information:
                                • Successful, ratio: 0.8% (good quality ratio 0.5%)
                                • Quality average: 37.4%
                                • Quality standard deviation: 34.8%
                                HCA Information:
                                • Successful, ratio: 98%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .exe
                                Warnings:
                                Show All
                                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 93.184.220.29, 20.82.210.154, 40.88.32.150, 92.122.145.220, 104.43.193.48, 184.30.24.56, 104.43.139.144, 168.61.161.212, 92.122.213.194, 92.122.213.247, 104.42.151.234, 67.26.73.254, 67.26.137.254, 8.241.78.254, 8.241.90.126, 8.241.79.126, 20.50.102.62, 20.54.26.129, 20.49.157.6
                                • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, auto.au.download.windowsupdate.com.c.footprint.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • VT rate limit hit for: /opt/package/joesandbox/database/analysis/385233/sample/YfceI5MZX4.exe

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                08:42:23API Interceptor1x Sleep call for process: YfceI5MZX4.exe modified
                                08:42:27API Interceptor981x Sleep call for process: RegSvcs.exe modified
                                08:42:27AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe

                                Joe Sandbox View / Context

                                IPs

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                79.134.225.30SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxGet hashmaliciousBrowse
                                  TSskTqG9V9.exeGet hashmaliciousBrowse
                                    Files Specification.xlsxGet hashmaliciousBrowse
                                      J62DQ7fO0b.exeGet hashmaliciousBrowse
                                        oE6O5K1emC.exeGet hashmaliciousBrowse
                                          AIC7VMxudf.exeGet hashmaliciousBrowse
                                            Payment Confirmation.exeGet hashmaliciousBrowse
                                              JOIN.exeGet hashmaliciousBrowse
                                                Itinerary.pdf.exeGet hashmaliciousBrowse
                                                  vVH0wIFYFd.exeGet hashmaliciousBrowse
                                                    GWee9QSphp.exeGet hashmaliciousBrowse
                                                      s7pnYY2USl.jarGet hashmaliciousBrowse
                                                        s7pnYY2USl.jarGet hashmaliciousBrowse
                                                          SecuriteInfo.com.BehavesLike.Win32.Generic.dc.exeGet hashmaliciousBrowse
                                                            Import and Export Regulation.xlsxGet hashmaliciousBrowse
                                                              BBdzKOGQ36.exeGet hashmaliciousBrowse
                                                                BL.exeGet hashmaliciousBrowse
                                                                  Payment Invoice.exeGet hashmaliciousBrowse
                                                                    Payment Invoice.pdf.exeGet hashmaliciousBrowse
                                                                      Inquiries_scan_011023783591374376585.exeGet hashmaliciousBrowse

                                                                        Domains

                                                                        No context

                                                                        ASN

                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                        FINK-TELECOM-SERVICESCHSOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxGet hashmaliciousBrowse
                                                                        • 79.134.225.30
                                                                        OjAJYVQ7iK.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.112
                                                                        TSskTqG9V9.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.30
                                                                        Files Specification.xlsxGet hashmaliciousBrowse
                                                                        • 79.134.225.30
                                                                        J62DQ7fO0b.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.30
                                                                        oE6O5K1emC.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.30
                                                                        zunUbtZ2Y3.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.40
                                                                        EASTERS.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.118
                                                                        LIST OF POEA DELISTED AGENCIES.pdf.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.9
                                                                        AWB.pdf.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.102
                                                                        AIC7VMxudf.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.30
                                                                        9mm case for ROYAL METAL INDUSTRIES 3milmonth Specification drawings.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.21
                                                                        PO50164.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.79
                                                                        Fast color scan to a PDFfile_1_20210331084231346.pdf.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.102
                                                                        n7dIHuG3v6.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.92
                                                                        F6JT4fXIAQ.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.92
                                                                        order_inquiry2094.xls.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.102
                                                                        5H957qLghX.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.25
                                                                        yBio5dWAOl.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.7
                                                                        wDIaJji4Vv.exeGet hashmaliciousBrowse
                                                                        • 79.134.225.7

                                                                        JA3 Fingerprints

                                                                        No context

                                                                        Dropped Files

                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeTSskTqG9V9.exeGet hashmaliciousBrowse
                                                                          oE6O5K1emC.exeGet hashmaliciousBrowse
                                                                            GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                                                                              wDIaJji4Vv.exeGet hashmaliciousBrowse
                                                                                cJtVGjtNGZ.exeGet hashmaliciousBrowse
                                                                                  Bilansno placanje.exeGet hashmaliciousBrowse
                                                                                    SecuriteInfo.com.Trojan.Inject4.9647.20479.exeGet hashmaliciousBrowse
                                                                                      wnIPBdB5OF.exeGet hashmaliciousBrowse
                                                                                        Delivery Form C.exeGet hashmaliciousBrowse
                                                                                          h6uc8EaDQX.exeGet hashmaliciousBrowse
                                                                                            3aDHivUqWtumbXb.exeGet hashmaliciousBrowse
                                                                                              fMy120EQiT6NaRd.exeGet hashmaliciousBrowse
                                                                                                SecuriteInfo.com.Variant.Bulz.394792.29952.exeGet hashmaliciousBrowse
                                                                                                  SecuriteInfo.com.Trojan.PackedNET.578.18498.exeGet hashmaliciousBrowse
                                                                                                    sfTZCyMKuC.exeGet hashmaliciousBrowse
                                                                                                      y9Rtu1cnBk.exeGet hashmaliciousBrowse
                                                                                                        Ixli7b5j6A.exeGet hashmaliciousBrowse
                                                                                                          nq0aCrCXyE.exeGet hashmaliciousBrowse
                                                                                                            73SriHObnQ.exeGet hashmaliciousBrowse
                                                                                                              0672IMP000158021.pdf.exeGet hashmaliciousBrowse

                                                                                                                Created / dropped Files

                                                                                                                C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):32768
                                                                                                                Entropy (8bit):3.7515815714465193
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:384:BOj9Y8/gS7SDriLGKq1MHR5U4Ag6ihJSxUCR1rgCPKabK2t0X5P7DZ+JgWSW72uw:B+gSAdN1MH3HAFRJngW2u
                                                                                                                MD5:71369277D09DA0830C8C59F9E22BB23A
                                                                                                                SHA1:37F9781314F0F6B7E9CB529A573F2B1C8DE9E93F
                                                                                                                SHA-256:D4527B7AD2FC4778CC5BE8709C95AEA44EAC0568B367EE14F7357D72898C3698
                                                                                                                SHA-512:2F470383E3C796C4CF212EC280854DBB9E7E8C8010CE6857E58F8E7066D7516B7CD7039BC5C0F547E1F5C7F9F2287869ADFFB2869800B08B2982A88BE96E9FB7
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Joe Sandbox View:
                                                                                                                • Filename: TSskTqG9V9.exe, Detection: malicious, Browse
                                                                                                                • Filename: oE6O5K1emC.exe, Detection: malicious, Browse
                                                                                                                • Filename: GS_ PO NO.1862021.exe, Detection: malicious, Browse
                                                                                                                • Filename: wDIaJji4Vv.exe, Detection: malicious, Browse
                                                                                                                • Filename: cJtVGjtNGZ.exe, Detection: malicious, Browse
                                                                                                                • Filename: Bilansno placanje.exe, Detection: malicious, Browse
                                                                                                                • Filename: SecuriteInfo.com.Trojan.Inject4.9647.20479.exe, Detection: malicious, Browse
                                                                                                                • Filename: wnIPBdB5OF.exe, Detection: malicious, Browse
                                                                                                                • Filename: Delivery Form C.exe, Detection: malicious, Browse
                                                                                                                • Filename: h6uc8EaDQX.exe, Detection: malicious, Browse
                                                                                                                • Filename: 3aDHivUqWtumbXb.exe, Detection: malicious, Browse
                                                                                                                • Filename: fMy120EQiT6NaRd.exe, Detection: malicious, Browse
                                                                                                                • Filename: SecuriteInfo.com.Variant.Bulz.394792.29952.exe, Detection: malicious, Browse
                                                                                                                • Filename: SecuriteInfo.com.Trojan.PackedNET.578.18498.exe, Detection: malicious, Browse
                                                                                                                • Filename: sfTZCyMKuC.exe, Detection: malicious, Browse
                                                                                                                • Filename: y9Rtu1cnBk.exe, Detection: malicious, Browse
                                                                                                                • Filename: Ixli7b5j6A.exe, Detection: malicious, Browse
                                                                                                                • Filename: nq0aCrCXyE.exe, Detection: malicious, Browse
                                                                                                                • Filename: 73SriHObnQ.exe, Detection: malicious, Browse
                                                                                                                • Filename: 0672IMP000158021.pdf.exe, Detection: malicious, Browse
                                                                                                                Reputation:moderate, very likely benign file
                                                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{Z.................P... .......k... ........@.. ...............................[....@..................................k..K................................... k............................................... ............... ..H............text....K... ...P.................. ..`.rsrc................`..............@..@.reloc...............p..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\YfceI5MZX4.exe.log
                                                                                                                Process:C:\Users\user\Desktop\YfceI5MZX4.exe
                                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                                Category:modified
                                                                                                                Size (bytes):664
                                                                                                                Entropy (8bit):5.288448637977022
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk70U2xANlW3ANv:MLF20NaL3z2p29hJ5g522rW2xAi3A9
                                                                                                                MD5:B1DB55991C3DA14E35249AEA1BC357CA
                                                                                                                SHA1:0DD2D91198FDEF296441B12F1A906669B279700C
                                                                                                                SHA-256:34D3E48321D5010AD2BD1F3F0B728077E4F5A7F70D66FA36B57E5209580B6BDC
                                                                                                                SHA-512:BE38A31888C9C2F8047FA9C99672CB985179D325107514B7500DDA9523AE3E1D20B45EACC4E6C8A5D096360D0FBB98A120E63F38FFE324DF8A0559F6890CC801
                                                                                                                Malicious:true
                                                                                                                Reputation:moderate, very likely benign file
                                                                                                                Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\35774dc3cd31b4550ab06c3354cf4ba5\System.Runtime.Remoting.ni.dll",0..
                                                                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                                                                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                                Category:modified
                                                                                                                Size (bytes):120
                                                                                                                Entropy (8bit):5.016405576253028
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:QHXMKaoWglAFXMWA2yTMGfsbNXLVd49Am12MFuAvOAsDeieVyn:Q3LawlAFXMWTyAGCFLIP12MUAvvrs
                                                                                                                MD5:50DEC1858E13F033E6DCA3CBFAD5E8DE
                                                                                                                SHA1:79AE1E9131B0FAF215B499D2F7B4C595AA120925
                                                                                                                SHA-256:14A557E226E3BA8620BB3A70035E1E316F1E9FB5C9E8F74C07110EE90B8D8AE4
                                                                                                                SHA-512:1BD73338DF685A5B57B0546E102ECFDEE65800410D6F77845E50456AC70DE72929088AF19B59647F01CBA7A5ACFB399C52D9EF2402A9451366586862EF88E7BF
                                                                                                                Malicious:false
                                                                                                                Reputation:moderate, very likely benign file
                                                                                                                Preview: 1,"fusion","GAC",0..2,"System.EnterpriseServices, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                                                C:\Users\user\AppData\Local\Temp\tmp7762.tmp
                                                                                                                Process:C:\Users\user\Desktop\YfceI5MZX4.exe
                                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):1646
                                                                                                                Entropy (8bit):5.163880473843948
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBatn:cbhC7ZlNQF/rydbz9I3YODOLNdq3W
                                                                                                                MD5:50FDC626522E1DF1A07E1D398F973780
                                                                                                                SHA1:0ABC2C77CCC61B37DE9D46F29D4C5502E557A025
                                                                                                                SHA-256:1C91BC758FA2DDAAAA0436A3AA7D56AA59D381A358658FBB8632CCACE623E026
                                                                                                                SHA-512:A4AF7DCABE63A86D665C64C8F0C80D240D11EDEA89E4F33FDBF0E4F82EE892C61E713F6D5044CA601271DE26956B6E0A8F7A680DA8F8669EEF7DFFF4F285ED22
                                                                                                                Malicious:true
                                                                                                                Reputation:low
                                                                                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                                                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                File Type:Non-ISO extended-ASCII text, with no line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):8
                                                                                                                Entropy (8bit):3.0
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:hRn:Ln
                                                                                                                MD5:A127AD6897FA6E51DF688E6D956222AC
                                                                                                                SHA1:0D7279C1E6363F5B40B8BE2D0B8153E84C88469F
                                                                                                                SHA-256:2A2A333F41D3469127ACFF3D213E66B1E987AE2DF1B47C928774B2F1757BC33B
                                                                                                                SHA-512:116C9B6576214AB66D5D19B2B2B7C47F3573FCB7385FB1C28E3D585B4891B2259C63A906C5951832264CFBA4F016B1ED27C5C7B1E5894333D207B5F3B7E5BC35
                                                                                                                Malicious:true
                                                                                                                Reputation:low
                                                                                                                Preview: 7.D....H
                                                                                                                C:\Users\user\AppData\Roaming\gmSlQSien.exe
                                                                                                                Process:C:\Users\user\Desktop\YfceI5MZX4.exe
                                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):802304
                                                                                                                Entropy (8bit):7.807064216316379
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:12288:fqPhNb1Cpc0vs3YpRTYmuCBWhfCfyxmbKzYwafnJMKrXe3tw2luRVZzQKaq:iPhxcpHUIpRTY0c1uyUeU3nJMKoCaq
                                                                                                                MD5:A3CBEB3E732B11954572B3EE6755242C
                                                                                                                SHA1:EBB41B49DE8F1B09EA20DABFFCFD85B93B68D7F3
                                                                                                                SHA-256:E006460AD1E34DDBBC28430C2D529A7EE491893C7AE8B6902B2D8D8C56620510
                                                                                                                SHA-512:455C3CAE5F85B8F3334004E09C5EF42BB6E8410F7501AEF0D520E1023EB376E31D6FA892DAB8DC8AAEA94914F31EC7915E8424362F1046F25F9B55C58EF94BD6
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....s`..............P..2...........P... ...`....@.. ....................................@.................................@P..O....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............<..............@..B................tP......H........}..du...............]...........................................0............(....(..........(.....o ....*.....................(!......("......(#......($......(%....*N..(....o....(&....*&..('....*.s(........s)........s*........s+........s,........*....0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0..<........~.....(2.....,!r...p.....(3...o4...s5............~.....+..*.0......
                                                                                                                C:\Users\user\AppData\Roaming\gmSlQSien.exe:Zone.Identifier
                                                                                                                Process:C:\Users\user\Desktop\YfceI5MZX4.exe
                                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):26
                                                                                                                Entropy (8bit):3.95006375643621
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:ggPYV:rPYV
                                                                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                                Malicious:true
                                                                                                                Preview: [ZoneTransfer]....ZoneId=0
                                                                                                                \Device\ConDrv
                                                                                                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):1145
                                                                                                                Entropy (8bit):4.462201512373672
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:24:zKLXkzPDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0zPDQntKKH1MqJC
                                                                                                                MD5:46EBEB88876A00A52CC37B1F8E0D0438
                                                                                                                SHA1:5E5DB352F964E5F398301662FF558BD905798A65
                                                                                                                SHA-256:D65BD5A6CC112838AFE8FA70BF61FD13C1313BCE3EE3E76C50E454D7B581238B
                                                                                                                SHA-512:E713E6F304A469FB71235C598BC7E2C6F8458ABC61DAF3D1F364F66579CAFA4A7F3023E585BDA552FB400009E7805A8CA0311A50D5EDC9C2AD2D067772A071BE
                                                                                                                Malicious:false
                                                                                                                Preview: Microsoft (R) .NET Framework Services Installation Utility Version 2.0.50727.8922..Copyright (c) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output...

                                                                                                                Static File Info

                                                                                                                General

                                                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Entropy (8bit):7.807064216316379
                                                                                                                TrID:
                                                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                                                                File name:YfceI5MZX4.exe
                                                                                                                File size:802304
                                                                                                                MD5:a3cbeb3e732b11954572b3ee6755242c
                                                                                                                SHA1:ebb41b49de8f1b09ea20dabffcfd85b93b68d7f3
                                                                                                                SHA256:e006460ad1e34ddbbc28430c2d529a7ee491893c7ae8b6902b2d8d8c56620510
                                                                                                                SHA512:455c3cae5f85b8f3334004e09c5ef42bb6e8410f7501aef0d520e1023eb376e31d6fa892dab8dc8aaea94914f31ec7915e8424362f1046f25f9b55c58ef94bd6
                                                                                                                SSDEEP:12288:fqPhNb1Cpc0vs3YpRTYmuCBWhfCfyxmbKzYwafnJMKrXe3tw2luRVZzQKaq:iPhxcpHUIpRTY0c1uyUeU3nJMKoCaq
                                                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....s`..............P..2...........P... ...`....@.. ....................................@................................

                                                                                                                File Icon

                                                                                                                Icon Hash:5dd0e0ccc4ecb3f0

                                                                                                                Static PE Info

                                                                                                                General

                                                                                                                Entrypoint:0x4b5092
                                                                                                                Entrypoint Section:.text
                                                                                                                Digitally signed:false
                                                                                                                Imagebase:0x400000
                                                                                                                Subsystem:windows gui
                                                                                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                                                Time Stamp:0x6073DD85 [Mon Apr 12 05:41:25 2021 UTC]
                                                                                                                TLS Callbacks:
                                                                                                                CLR (.Net) Version:v2.0.50727
                                                                                                                OS Version Major:4
                                                                                                                OS Version Minor:0
                                                                                                                File Version Major:4
                                                                                                                File Version Minor:0
                                                                                                                Subsystem Version Major:4
                                                                                                                Subsystem Version Minor:0
                                                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                                                Entrypoint Preview

                                                                                                                Instruction
                                                                                                                jmp dword ptr [00402000h]
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al

                                                                                                                Data Directories

                                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xb50400x4f.text
                                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xb60000x107ec.rsrc
                                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xc80000xc.reloc
                                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                                Sections

                                                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                .text0x20000xb30980xb3200False0.954216732816data7.9540154939IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                                .rsrc0xb60000x107ec0x10800False0.389012192235data4.61893381614IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                .reloc0xc80000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                                Resources

                                                                                                                NameRVASizeTypeLanguageCountry
                                                                                                                RT_ICON0xb63700x2e8data
                                                                                                                RT_ICON0xb66580x128GLS_BINARY_LSB_FIRST
                                                                                                                RT_ICON0xb67800xea8data
                                                                                                                RT_ICON0xb76280x8a8data
                                                                                                                RT_ICON0xb7ed00x568GLS_BINARY_LSB_FIRST
                                                                                                                RT_ICON0xb84380x35e2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                                                                RT_ICON0xbba1c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 240, next used block 117440512
                                                                                                                RT_ICON0xbfc440x25a8data
                                                                                                                RT_ICON0xc21ec0x1a68data
                                                                                                                RT_ICON0xc3c540x10a8data
                                                                                                                RT_ICON0xc4cfc0x988data
                                                                                                                RT_ICON0xc56840x6b8data
                                                                                                                RT_ICON0xc5d3c0x468GLS_BINARY_LSB_FIRST
                                                                                                                RT_GROUP_ICON0xc61a40xbcdata
                                                                                                                RT_VERSION0xc62600x39edata
                                                                                                                RT_MANIFEST0xc66000x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                                                Imports

                                                                                                                DLLImport
                                                                                                                mscoree.dll_CorExeMain

                                                                                                                Version Infos

                                                                                                                DescriptionData
                                                                                                                Translation0x0000 0x04b0
                                                                                                                LegalCopyrightCopyright 2012
                                                                                                                Assembly Version8.1.1.15
                                                                                                                InternalNameHostProtectionAttribute.exe
                                                                                                                FileVersion8.1.1.14
                                                                                                                CompanyNameLandskip Yard Care
                                                                                                                LegalTrademarksA++
                                                                                                                Comments
                                                                                                                ProductNameLevelActivator
                                                                                                                ProductVersion8.1.1.14
                                                                                                                FileDescriptionLevelActivator
                                                                                                                OriginalFilenameHostProtectionAttribute.exe

                                                                                                                Network Behavior

                                                                                                                Network Port Distribution

                                                                                                                TCP Packets

                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                Apr 12, 2021 08:42:29.363123894 CEST496991144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:42:32.425513029 CEST496991144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:42:38.511714935 CEST496991144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:42:49.366292953 CEST497061144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:42:52.418766022 CEST497061144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:42:58.427855968 CEST497061144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:43:08.273983955 CEST497131144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:43:11.288147926 CEST497131144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:43:17.304327965 CEST497131144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:43:38.994872093 CEST497221144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:43:42.011059999 CEST497221144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:43:48.009885073 CEST497221144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:43:56.278103113 CEST497241144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:43:59.276504993 CEST497241144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:44:05.277298927 CEST497241144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:44:14.357616901 CEST497271144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:44:17.356199980 CEST497271144192.168.2.579.134.225.30
                                                                                                                Apr 12, 2021 08:44:23.356575012 CEST497271144192.168.2.579.134.225.30

                                                                                                                UDP Packets

                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                Apr 12, 2021 08:42:10.067460060 CEST5270453192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:42:10.116363049 CEST53527048.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:42:10.292814970 CEST5221253192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:42:10.342643023 CEST53522128.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:42:10.418169022 CEST5430253192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:42:10.457545042 CEST5378453192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:42:10.478559971 CEST53543028.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:42:10.506891966 CEST53537848.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:42:14.032279015 CEST6530753192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:42:14.089629889 CEST53653078.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:42:14.621452093 CEST6434453192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:42:14.682523966 CEST53643448.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:42:30.647139072 CEST6206053192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:42:30.696383953 CEST53620608.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:42:37.969374895 CEST6180553192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:42:38.033551931 CEST53618058.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:42:47.482378006 CEST5479553192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:42:47.554399967 CEST53547958.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:42:55.569442034 CEST4955753192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:42:55.618032932 CEST53495578.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:42:56.509201050 CEST6173353192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:42:56.560765982 CEST53617338.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:42:57.330655098 CEST6544753192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:42:57.392369032 CEST53654478.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:42:57.416785955 CEST5244153192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:42:57.468317986 CEST53524418.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:42:58.331079006 CEST6217653192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:42:58.382704973 CEST53621768.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:43:05.623831987 CEST5959653192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:43:05.681453943 CEST53595968.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:43:14.520704985 CEST6529653192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:43:14.572243929 CEST53652968.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:43:15.428941965 CEST6318353192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:43:15.477699041 CEST53631838.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:43:16.488647938 CEST6015153192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:43:16.545650959 CEST53601518.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:43:17.499808073 CEST5696953192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:43:17.551426888 CEST53569698.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:43:18.761195898 CEST5516153192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:43:18.820871115 CEST53551618.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:43:25.496901989 CEST5475753192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:43:25.556852102 CEST53547578.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:43:25.590512991 CEST4999253192.168.2.58.8.4.4
                                                                                                                Apr 12, 2021 08:43:25.642020941 CEST53499928.8.4.4192.168.2.5
                                                                                                                Apr 12, 2021 08:43:25.719460964 CEST6007553192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:43:25.781299114 CEST53600758.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:43:29.804601908 CEST5501653192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:43:29.853324890 CEST53550168.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:43:30.054189920 CEST6434553192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:43:30.113343954 CEST53643458.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:43:30.342442989 CEST5712853192.168.2.58.8.4.4
                                                                                                                Apr 12, 2021 08:43:30.399633884 CEST53571288.8.4.4192.168.2.5
                                                                                                                Apr 12, 2021 08:43:30.409482956 CEST5479153192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:43:30.458221912 CEST53547918.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:43:33.248797894 CEST5046353192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:43:33.309731007 CEST53504638.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:43:34.618954897 CEST5039453192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:43:34.677774906 CEST53503948.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:43:34.846693993 CEST5853053192.168.2.58.8.4.4
                                                                                                                Apr 12, 2021 08:43:34.903510094 CEST53585308.8.4.4192.168.2.5
                                                                                                                Apr 12, 2021 08:43:34.932809114 CEST5381353192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:43:34.981901884 CEST53538138.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:43:49.493936062 CEST6373253192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:43:49.559073925 CEST53637328.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:44:12.017734051 CEST5734453192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:44:12.069437027 CEST53573448.8.8.8192.168.2.5
                                                                                                                Apr 12, 2021 08:44:13.993952036 CEST5445053192.168.2.58.8.8.8
                                                                                                                Apr 12, 2021 08:44:14.042953014 CEST53544508.8.8.8192.168.2.5

                                                                                                                DNS Queries

                                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                                Apr 12, 2021 08:43:25.496901989 CEST192.168.2.58.8.8.80x2d32Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:25.590512991 CEST192.168.2.58.8.4.40x5856Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:25.719460964 CEST192.168.2.58.8.8.80x3e34Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:30.054189920 CEST192.168.2.58.8.8.80x287eStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:30.342442989 CEST192.168.2.58.8.4.40xa69Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:30.409482956 CEST192.168.2.58.8.8.80xdd53Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:34.618954897 CEST192.168.2.58.8.8.80xaa7Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:34.846693993 CEST192.168.2.58.8.4.40xea51Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:34.932809114 CEST192.168.2.58.8.8.80x471Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)

                                                                                                                DNS Answers

                                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                                Apr 12, 2021 08:43:25.556852102 CEST8.8.8.8192.168.2.50x2d32Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:25.642020941 CEST8.8.4.4192.168.2.50x5856Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:25.781299114 CEST8.8.8.8192.168.2.50x3e34Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:30.113343954 CEST8.8.8.8192.168.2.50x287eName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:30.399633884 CEST8.8.4.4192.168.2.50xa69Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:30.458221912 CEST8.8.8.8192.168.2.50xdd53Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:34.677774906 CEST8.8.8.8192.168.2.50xaa7Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:34.903510094 CEST8.8.4.4192.168.2.50xea51Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                                                                                Apr 12, 2021 08:43:34.981901884 CEST8.8.8.8192.168.2.50x471Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)

                                                                                                                Code Manipulations

                                                                                                                Statistics

                                                                                                                Behavior

                                                                                                                Click to jump to process

                                                                                                                System Behavior

                                                                                                                General

                                                                                                                Start time:08:42:17
                                                                                                                Start date:12/04/2021
                                                                                                                Path:C:\Users\user\Desktop\YfceI5MZX4.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:'C:\Users\user\Desktop\YfceI5MZX4.exe'
                                                                                                                Imagebase:0x160000
                                                                                                                File size:802304 bytes
                                                                                                                MD5 hash:A3CBEB3E732B11954572B3EE6755242C
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.247117060.0000000002945000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.248677483.0000000003AB9000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.248677483.0000000003AB9000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.248677483.0000000003AB9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                Reputation:low

                                                                                                                General

                                                                                                                Start time:08:42:25
                                                                                                                Start date:12/04/2021
                                                                                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp7762.tmp'
                                                                                                                Imagebase:0x12d0000
                                                                                                                File size:185856 bytes
                                                                                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high

                                                                                                                General

                                                                                                                Start time:08:42:25
                                                                                                                Start date:12/04/2021
                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                Imagebase:0x7ff7ecfc0000
                                                                                                                File size:625664 bytes
                                                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high

                                                                                                                General

                                                                                                                Start time:08:42:26
                                                                                                                Start date:12/04/2021
                                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                Imagebase:0x9b0000
                                                                                                                File size:32768 bytes
                                                                                                                MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.500274474.0000000003FBB000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.500274474.0000000003FBB000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.492901504.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.492901504.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.492901504.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.501754781.0000000005470000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.501754781.0000000005470000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.502139157.00000000058D0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.502139157.00000000058D0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.502139157.00000000058D0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                Reputation:moderate

                                                                                                                General

                                                                                                                Start time:08:42:35
                                                                                                                Start date:12/04/2021
                                                                                                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                                                                Imagebase:0x3f0000
                                                                                                                File size:32768 bytes
                                                                                                                MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                Antivirus matches:
                                                                                                                • Detection: 0%, Metadefender, Browse
                                                                                                                • Detection: 0%, ReversingLabs
                                                                                                                Reputation:moderate

                                                                                                                General

                                                                                                                Start time:08:42:36
                                                                                                                Start date:12/04/2021
                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                Imagebase:0x7ff7ecfc0000
                                                                                                                File size:625664 bytes
                                                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high

                                                                                                                Disassembly

                                                                                                                Code Analysis

                                                                                                                Reset < >