Loading ...

Play interactive tourEdit tour

Windows Analysis Report 7keerHhHvn.exe

Overview

General Information

Sample Name:7keerHhHvn.exe
Analysis ID:458550
MD5:782783574d2d4b67666b77b686c2e673
SHA1:8eeec0963fa7eaf3115335c03315ecc203babf9b
SHA256:0d2aeb4a2f85b9bf8ae3990a3ddea5a242d0db5186263e3ccf2435bbc48ec478
Tags:exeMalware
Infos:

Most interesting Screenshot:

Detection

Nanocore GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
GuLoader behavior detected
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected GuLoader
Yara detected Nanocore RAT
C2 URLs / IPs found in malware configuration
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses dynamic DNS services
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality to retrieve information about pressed keystrokes
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • 7keerHhHvn.exe (PID: 1056 cmdline: 'C:\Users\user\Desktop\7keerHhHvn.exe' MD5: 782783574D2D4B67666B77B686C2E673)
    • RegAsm.exe (PID: 2476 cmdline: 'C:\Users\user\Desktop\7keerHhHvn.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
      • conhost.exe (PID: 3596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • filename1.exe (PID: 2344 cmdline: 'C:\Users\user\subfolder1\filename1.exe' MD5: 782783574D2D4B67666B77B686C2E673)
    • RegAsm.exe (PID: 4168 cmdline: 'C:\Users\user\subfolder1\filename1.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • RegAsm.exe (PID: 3448 cmdline: 'C:\Users\user\subfolder1\filename1.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • RegAsm.exe (PID: 5904 cmdline: 'C:\Users\user\subfolder1\filename1.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
      • conhost.exe (PID: 4792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • filename1.exe (PID: 5512 cmdline: 'C:\Users\user\subfolder1\filename1.exe' MD5: 782783574D2D4B67666B77B686C2E673)
    • RegAsm.exe (PID: 5376 cmdline: 'C:\Users\user\subfolder1\filename1.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • RegAsm.exe (PID: 4736 cmdline: 'C:\Users\user\subfolder1\filename1.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
      • conhost.exe (PID: 5028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "07e10254-b226-4020-a6dd-2e85529c", "Group": "FRANCE", "Domain1": "mexi11.ddns.net", "Domain2": "127.0.0.1", "Port": 4040, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "", "BackupDNSServer": "37.235.1.177"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000029.00000002.780177556.000000001EBB1000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000029.00000002.780177556.000000001EBB1000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x493f5:$a: NanoCore
    • 0x4944e:$a: NanoCore
    • 0x4948b:$a: NanoCore
    • 0x49504:$a: NanoCore
    • 0x5cbaf:$a: NanoCore
    • 0x5cbc4:$a: NanoCore
    • 0x5cbf9:$a: NanoCore
    • 0x7567b:$a: NanoCore
    • 0x75690:$a: NanoCore
    • 0x756c5:$a: NanoCore
    • 0x49457:$b: ClientPlugin
    • 0x49494:$b: ClientPlugin
    • 0x49d92:$b: ClientPlugin
    • 0x49d9f:$b: ClientPlugin
    • 0x5c96b:$b: ClientPlugin
    • 0x5c986:$b: ClientPlugin
    • 0x5c9b6:$b: ClientPlugin
    • 0x5cbcd:$b: ClientPlugin
    • 0x5cc02:$b: ClientPlugin
    • 0x75437:$b: ClientPlugin
    • 0x75452:$b: ClientPlugin
    00000026.00000002.767234010.000000001F1D1000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000026.00000002.767234010.000000001F1D1000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x493f5:$a: NanoCore
      • 0x4944e:$a: NanoCore
      • 0x4948b:$a: NanoCore
      • 0x49504:$a: NanoCore
      • 0x5cbaf:$a: NanoCore
      • 0x5cbc4:$a: NanoCore
      • 0x5cbf9:$a: NanoCore
      • 0x7567b:$a: NanoCore
      • 0x75690:$a: NanoCore
      • 0x756c5:$a: NanoCore
      • 0x49457:$b: ClientPlugin
      • 0x49494:$b: ClientPlugin
      • 0x49d92:$b: ClientPlugin
      • 0x49d9f:$b: ClientPlugin
      • 0x5c96b:$b: ClientPlugin
      • 0x5c986:$b: ClientPlugin
      • 0x5c9b6:$b: ClientPlugin
      • 0x5cbcd:$b: ClientPlugin
      • 0x5cc02:$b: ClientPlugin
      • 0x75437:$b: ClientPlugin
      • 0x75452:$b: ClientPlugin
      00000029.00000002.780062745.000000001DBB1000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 11 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        38.2.RegAsm.exe.1e1f3c68.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        38.2.RegAsm.exe.1e1f3c68.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        38.2.RegAsm.exe.1f219616.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0x145e3:$x1: NanoCore.ClientPluginHost
        • 0x2d0af:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        • 0x14610:$x2: IClientNetworkHost
        • 0x2d0dc:$x2: IClientNetworkHost
        38.2.RegAsm.exe.1f219616.4.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x145e3:$x2: NanoCore.ClientPluginHost
        • 0x2d0af:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0x156be:$s4: PipeCreated
        • 0x2e18a:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        • 0x145fd:$s5: IClientLoggingHost
        • 0x2d0c9:$s5: IClientLoggingHost
        38.2.RegAsm.exe.1f219616.4.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          Click to see the 25 entries

          Sigma Overview

          AV Detection:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, ProcessId: 2476, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          E-Banking Fraud:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, ProcessId: 2476, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Stealing of Sensitive Information:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, ProcessId: 2476, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Remote Access Functionality:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, ProcessId: 2476, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000029.00000002.780177556.000000001EBB1000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "07e10254-b226-4020-a6dd-2e85529c", "Group": "FRANCE", "Domain1": "mexi11.ddns.net", "Domain2": "127.0.0.1", "Port": 4040, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "", "BackupDNSServer": "37.235.1.177"}
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\user\subfolder1\filename1.exeReversingLabs: Detection: 31%
          Multi AV Scanner detection for submitted fileShow sources
          Source: 7keerHhHvn.exeVirustotal: Detection: 25%Perma Link
          Source: 7keerHhHvn.exeReversingLabs: Detection: 26%
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f219616.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ebfe44c.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f21e44c.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ebf9616.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f21e44c.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ec02a75.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f222a75.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ebfe44c.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000029.00000002.780177556.000000001EBB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000026.00000002.767234010.000000001F1D1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000029.00000002.780062745.000000001DBB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000026.00000002.767134795.000000001E1D1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5904, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4736, type: MEMORYSTR
          Machine Learning detection for dropped fileShow sources
          Source: C:\Users\user\subfolder1\filename1.exeJoe Sandbox ML: detected
          Machine Learning detection for sampleShow sources
          Source: 7keerHhHvn.exeJoe Sandbox ML: detected
          Source: 7keerHhHvn.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: mexi11.ddns.net
          Source: Malware configuration extractorURLs: 127.0.0.1
          Uses dynamic DNS servicesShow sources
          Source: unknownDNS query: name: mexi11.ddns.net
          Source: global trafficTCP traffic: 192.168.2.3:49739 -> 194.5.98.74:4040
          Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
          Source: unknownDNS traffic detected: queries for: onedrive.live.com
          Source: RegAsm.exe, 00000026.00000002.762977823.0000000001739000.00000004.00000020.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
          Source: RegAsm.exe, 00000026.00000002.762977823.0000000001739000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.digicert.com0:
          Source: RegAsm.exe, 00000026.00000002.762977823.0000000001739000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.msocsp.com0
          Source: RegAsm.exe, 00000026.00000002.762926600.000000000170B000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/
          Source: RegAsm.exe, 00000026.00000002.762926600.000000000170B000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/download
          Source: RegAsm.exe, 00000029.00000002.774677046.00000000009F0000.00000004.00000001.sdmpString found in binary or memory: https://onedrive.live.com/download?cid=6D6F745EC8C6F9D8&resid=6D6F745EC8C6F9D8%21108&authkey=AKJRgu_
          Source: RegAsm.exe, 00000026.00000002.762926600.000000000170B000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/p
          Source: RegAsm.exe, 00000026.00000002.762977823.0000000001739000.00000004.00000020.sdmpString found in binary or memory: https://vt8dlg.bn.files.1drv.com/
          Source: RegAsm.exe, 00000026.00000002.763005730.0000000001755000.00000004.00000020.sdmpString found in binary or memory: https://vt8dlg.bn.files.1drv.com/y4mrn2hczejFxJUaC7t02Lzk3UBxBtUoFTWBuN2lZyzI4ePO5huRlr2N1MK6Md6g2le
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_004028BC GetAsyncKeyState,
          Source: RegAsm.exe, 00000026.00000002.767234010.000000001F1D1000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f219616.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ebfe44c.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f21e44c.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ebf9616.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f21e44c.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ec02a75.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f222a75.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ebfe44c.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000029.00000002.780177556.000000001EBB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000026.00000002.767234010.000000001F1D1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000029.00000002.780062745.000000001DBB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000026.00000002.767134795.000000001E1D1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5904, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4736, type: MEMORYSTR

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 38.2.RegAsm.exe.1e1f3c68.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 38.2.RegAsm.exe.1f219616.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 38.2.RegAsm.exe.1f219616.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 41.2.RegAsm.exe.1ebfe44c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 41.2.RegAsm.exe.1dbd3c68.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 38.2.RegAsm.exe.1f21e44c.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 41.2.RegAsm.exe.1ebf9616.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 41.2.RegAsm.exe.1ebf9616.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 38.2.RegAsm.exe.1f21e44c.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 41.2.RegAsm.exe.1ec02a75.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 38.2.RegAsm.exe.1f222a75.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 41.2.RegAsm.exe.1ebfe44c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000029.00000002.780177556.000000001EBB1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000026.00000002.767234010.000000001F1D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000029.00000002.780062745.000000001DBB1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000026.00000002.767134795.000000001E1D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: RegAsm.exe PID: 5904, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: RegAsm.exe PID: 4736, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess Stats: CPU usage > 98%
          Source: C:\Users\user\Desktop\7keerHhHvn.exeProcess Stats: CPU usage > 98%
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 38_2_202E2FA8
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 38_2_202E23A0
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 38_2_202E306F
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 38_2_202E3850
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 41_2_1FCF2FA8
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 41_2_1FCF23A0
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 41_2_1FCF3850
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 41_2_1FCF306F
          Source: 7keerHhHvn.exe, 00000000.00000000.206884693.0000000000423000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAbsurditiesun.exe vs 7keerHhHvn.exe
          Source: 7keerHhHvn.exeBinary or memory string: OriginalFilenameAbsurditiesun.exe vs 7keerHhHvn.exe
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
          Source: 7keerHhHvn.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: 38.2.RegAsm.exe.1e1f3c68.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 38.2.RegAsm.exe.1e1f3c68.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 38.2.RegAsm.exe.1f219616.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 38.2.RegAsm.exe.1f219616.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 38.2.RegAsm.exe.1f219616.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 41.2.RegAsm.exe.1ebfe44c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 41.2.RegAsm.exe.1ebfe44c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 41.2.RegAsm.exe.1dbd3c68.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 41.2.RegAsm.exe.1dbd3c68.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 38.2.RegAsm.exe.1f21e44c.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 38.2.RegAsm.exe.1f21e44c.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 41.2.RegAsm.exe.1ebf9616.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 41.2.RegAsm.exe.1ebf9616.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 41.2.RegAsm.exe.1ebf9616.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 38.2.RegAsm.exe.1f21e44c.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 38.2.RegAsm.exe.1f21e44c.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 41.2.RegAsm.exe.1ec02a75.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 41.2.RegAsm.exe.1ec02a75.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 38.2.RegAsm.exe.1f222a75.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 38.2.RegAsm.exe.1f222a75.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 41.2.RegAsm.exe.1ebfe44c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 41.2.RegAsm.exe.1ebfe44c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000029.00000002.780177556.000000001EBB1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000026.00000002.767234010.000000001F1D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000029.00000002.780062745.000000001DBB1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000026.00000002.767134795.000000001E1D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: RegAsm.exe PID: 5904, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: RegAsm.exe PID: 4736, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: classification engineClassification label: mal100.troj.evad.winEXE@18/3@126/2
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Users\user\subfolder1Jump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3596:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5028:120:WilError_01
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4792:120:WilError_01
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{07e10254-b226-4020-a6dd-2e85529cdca0}
          Source: C:\Users\user\Desktop\7keerHhHvn.exeFile created: C:\Users\user\AppData\Local\Temp\~DF6E485E0163CE766C.TMPJump to behavior
          Source: 7keerHhHvn.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\7keerHhHvn.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
          Source: C:\Users\user\subfolder1\filename1.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
          Source: C:\Users\user\subfolder1\filename1.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\7keerHhHvn.exeFile read: C:\$Recycle.Bin\S-1-5-21-3853321935-2125563209-4053062332-1002\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\7keerHhHvn.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: 7keerHhHvn.exeVirustotal: Detection: 25%
          Source: 7keerHhHvn.exeReversingLabs: Detection: 26%
          Source: unknownProcess created: C:\Users\user\Desktop\7keerHhHvn.exe 'C:\Users\user\Desktop\7keerHhHvn.exe'
          Source: C:\Users\user\Desktop\7keerHhHvn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\7keerHhHvn.exe'
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Users\user\subfolder1\filename1.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: unknownProcess created: C:\Users\user\subfolder1\filename1.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Users\user\subfolder1\filename1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Users\user\subfolder1\filename1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Users\user\subfolder1\filename1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\subfolder1\filename1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Users\user\subfolder1\filename1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\7keerHhHvn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\7keerHhHvn.exe'
          Source: C:\Users\user\subfolder1\filename1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Users\user\subfolder1\filename1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Users\user\subfolder1\filename1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Users\user\subfolder1\filename1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Users\user\subfolder1\filename1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Users\user\Desktop\7keerHhHvn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4a04656d-52aa-49de-8a09-cb178760e748}\InProcServer32
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll

          Data Obfuscation:

          barindex
          Yara detected GuLoaderShow sources
          Source: Yara matchFile source: 00000029.00000002.774677046.00000000009F0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000026.00000002.762525078.0000000000FD0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5904, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4736, type: MEMORYSTR
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_004066EE push edx; iretd
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_00407D67 push es; ret
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C143DC push ebp; ret
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C12DDF push ss; retf
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C14FDF push es; ret
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C12593 push ss; retf
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C14598 push ss; ret
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C12BB8 push ss; retf
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C12D17 push ss; ret
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C124E4 push ss; retf
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C120EE push edi; ret
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C140F3 push esp; ret
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C156A2 push FFFFFFE5h; ret
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C120AA push edi; ret
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C156AD push FFFFFFE5h; ret
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C12203 pushad ; ret
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C13C0B push esi; ret
          Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_03C12E12 push ss; retf
          Source: C:\Users\user\subfolder1\filename1.exeCode function: 27_2_02A912CB push ss; retf
          Source: C:\Users\user\subfolder1\filename1.exeCode function: 27_2_02A93C2C pushfd ; iretd
          Source: C:\Users\user\subfolder1\filename1.exeCode function: 27_2_02A96220 push ds; ret
          Source: C:\Users\user\subfolder1\filename1.exeCode function: 27_2_02A93604 push ss; retf
          Source: C:\Users\user\subfolder1\filename1.exeCode function: 27_2_02A93C1F pushfd ; iretd
          Source: C:\Users\user\subfolder1\filename1.exeCode function: 27_2_02A94612 push ss; ret
          Source: C:\Users\user\subfolder1\filename1.exeCode function: 27_2_02A9625A push ds; ret
          Source: C:\Users\user\subfolder1\filename1.exeCode function: 27_2_02A9665E push FFFFFF8Dh; ret
          Source: C:\Users\user\subfolder1\filename1.exeCode function: 27_2_02A94653 pushad ; ret
          Source: C:\Users\user\subfolder1\filename1.exeCode function: 27_2_02A93FB2 pushad ; retf
          Source: C:\Users\user\subfolder1\filename1.exeCode function: 27_2_02A95DB5 push cs; iretd
          Source: C:\Users\user\subfolder1\filename1.exeCode function: 27_2_02A90FB7 push eax; ret
          Source: C:\Users\user\subfolder1\filename1.exeCode function: 27_2_02A92BDD push ss; retf
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Users\user\subfolder1\filename1.exeJump to dropped file
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe:Zone.Identifier read attributes | delete
          Source: C:\Users\user\Desktop\7keerHhHvn.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7keerHhHvn.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7keerHhHvn.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7keerHhHvn.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\subfolder1\filename1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
          Source: C:\Users\user\Desktop\7keerHhHvn.exeRDTSC instruction interceptor: First address: 0000000003C111D1 second address: 0000000003C1734D instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a call 00007FFA90374B8Eh 0x0000000f pushad 0x00000010 lfence 0x00000013 rdtsc
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001121FB1 second address: 0000000001121FB1 instructions:
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001123F9B second address: 0000000001123F9B instructions:
          Source: C:\Users\user\subfolder1\filename1.exeRDTSC instruction interceptor: First address: 0000000002A911D1 second address: 0000000002A9734D instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a call 00007FFA90374B8Eh 0x0000000f pushad 0x00000010 lfence 0x00000013 rdtsc
          Source: C:\Users\user\subfolder1\filename1.exeRDTSC instruction interceptor: First address: 0000000002AE11D1 second address: 0000000002AE734D instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a call 00007FFA90374B8Eh 0x0000000f pushad 0x00000010 lfence 0x00000013 rdtsc
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001303F9B second address: 0000000001303F9B instructions:
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000D03F9B second address: 0000000000D03F9B instructions:
          Tries to detect Any.runShow sources
          Source: C:\Users\user\Desktop\7keerHhHvn.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Users\user\Desktop\7keerHhHvn.exeFile opened: C:\Program Files\qga\qga.exe
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
          Source: C:\Users\user\subfolder1\filename1.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Users\user\subfolder1\filename1.exeFile opened: C:\Program Files\qga\qga.exe
          Source: C:\Users\user\subfolder1\filename1.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Users\user\subfolder1\filename1.exeFile opened: C:\Program Files\qga\qga.exe
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: 7keerHhHvn.exe, 00000000.00000002.453217523.0000000003C50000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32USERPROFILE=WINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\REGASM.EXE\SYSWOW64\MSVBVM60.DLL
          Source: filename1.exe, 0000001C.00000002.767000852.0000000003C20000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32USERPROFILE=WINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\REGASM.EXE\SYSWOW64\MSVBVM60.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\REGASM.EXE\SYSWOW64\MSVBVM60.DLL
          Source: 7keerHhHvn.exe, 00000000.00000002.453217523.0000000003C50000.00000004.00000001.sdmp, filename1.exe, 0000001B.00000002.756747203.0000000003DB0000.00000004.00000001.sdmp, filename1.exe, 0000001C.00000002.767000852.0000000003C20000.00000004.00000001.sdmp, RegAsm.exe, 00000026.00000002.762525078.0000000000FD0000.00000004.00000001.sdmp, RegAsm.exe, 00000029.00000002.774677046.00000000009F0000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
          Source: filename1.exe, 0000001B.00000002.756747203.0000000003DB0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32USERPROFILE=WINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\REGASM.EXE\SYSWOW64\MSVBVM60.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\REGASM.EXE\SYSWOW64\MSVBVM60.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\REGASM.EXE\SYSWOW64\MSVBVM60.DLL
          Source: RegAsm.exe, 00000026.00000002.762525078.0000000000FD0000.00000004.00000001.sdmp, RegAsm.exe, 00000029.00000002.774677046.00000000009F0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32USERPROFILE=\FILENAME1.EXE\SUBFOLDER1SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCESTARTUP KEYHTTPS://ONEDRIVE.LIVE.COM/DOWNLOAD?CID=6D6F745EC8C6F9D8&RESID=6D6F745EC8C6F9D8%21108&AUTHKEY=AKJRGU_G9CQ6TRKWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKO
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\7keerHhHvn.exeRDTSC instruction interceptor: First address: 0000000003C16090 second address: 0000000003C16090 instructions: 0x00000000 rdtsc 0x00000002 mov eax, D06691AFh 0x00000007 xor eax, 51795B17h 0x0000000c sub eax, E89895FEh 0x00000011 sub eax, 988734B9h 0x00000016 cpuid 0x00000018 jmp 00007FFA9036EA76h 0x0000001a test bx, 62F2h 0x0000001f popad 0x00000020 call 00007FFA9036EA2Ch 0x00000025 lfence 0x00000028 mov edx, 3126F457h 0x0000002d xor edx, A11635D2h 0x00000033 xor edx, 122A2AF9h 0x00000039 xor edx, FDE4EB68h 0x0000003f mov edx, dword ptr [edx] 0x00000041 lfence 0x00000044 ret 0x00000045 cmp dh, ch 0x00000047 sub edx, esi 0x00000049 ret 0x0000004a test ah, dh 0x0000004c pop ecx 0x0000004d add edi, edx 0x0000004f dec ecx 0x00000050 mov dword ptr [ebp+0000017Ch], 339F83C1h 0x0000005a sub dword ptr [ebp+0000017Ch], 00B60B54h 0x00000064 sub dword ptr [ebp+0000017Ch], 2594365Ah 0x0000006e add dword ptr [ebp+0000017Ch], F2AABDEDh 0x00000078 cmp ecx, dword ptr [ebp+0000017Ch] 0x0000007e jne 00007FFA9036E974h 0x00000084 jmp 00007FFA9036EA82h 0x00000086 test ch, dh 0x00000088 mov dword ptr [ebp+00000274h], edi 0x0000008e mov edi, ecx 0x00000090 push edi 0x00000091 mov edi, dword ptr [ebp+00000274h] 0x00000097 call 00007FFA9036EA94h 0x0000009c call 00007FFA9036EAA8h 0x000000a1 lfence 0x000000a4 mov edx, 3126F457h 0x000000a9 xor edx, A11635D2h 0x000000af xor edx, 122A2AF9h 0x000000b5 xor edx, FDE4EB68h 0x000000bb mov edx, dword ptr [edx] 0x000000bd lfence 0x000000c0 ret 0x000000c1 mov esi, edx 0x000000c3 pushad 0x000000c4 rdtsc
          Source: C:\Users\user\Desktop\7keerHhHvn.exeRDTSC instruction interceptor: First address: 0000000003C163DB second address: 0000000003C163DB instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e mov eax, 179B936Ch 0x00000013 xor eax, 12709E28h 0x00000018 add eax, 314D5628h 0x0000001d sub eax, 3738636Bh 0x00000022 cpuid 0x00000024 bt ecx, 1Fh 0x00000028 jc 00007FFA9039E6F8h 0x0000002e popad 0x0000002f call 00007FFA9039B303h 0x00000034 lfence 0x00000037 rdtsc
          Source: C:\Users\user\Desktop\7keerHhHvn.exeRDTSC instruction interceptor: First address: 0000000003C111D1 second address: 0000000003C1734D instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a call 00007FFA90374B8Eh 0x0000000f pushad 0x00000010 lfence 0x00000013 rdtsc
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001126090 second address: 0000000001126090 instructions: 0x00000000 rdtsc 0x00000002 mov eax, D06691AFh 0x00000007 xor eax, 51795B17h 0x0000000c sub eax, E89895FEh 0x00000011 sub eax, 988734B9h 0x00000016 cpuid 0x00000018 jmp 00007FFA9039B2C6h 0x0000001a test bx, 62F2h 0x0000001f popad 0x00000020 call 00007FFA9039B27Ch 0x00000025 lfence 0x00000028 mov edx, 3126F457h 0x0000002d xor edx, A11635D2h 0x00000033 xor edx, 122A2AF9h 0x00000039 xor edx, FDE4EB68h 0x0000003f mov edx, dword ptr [edx] 0x00000041 lfence 0x00000044 ret 0x00000045 cmp dh, ch 0x00000047 sub edx, esi 0x00000049 ret 0x0000004a test ah, dh 0x0000004c pop ecx 0x0000004d add edi, edx 0x0000004f dec ecx 0x00000050 mov dword ptr [ebp+0000017Ch], 339F83C1h 0x0000005a sub dword ptr [ebp+0000017Ch], 00B60B54h 0x00000064 sub dword ptr [ebp+0000017Ch], 2594365Ah 0x0000006e add dword ptr [ebp+0000017Ch], F2AABDEDh 0x00000078 cmp ecx, dword ptr [ebp+0000017Ch] 0x0000007e jne 00007FFA9039B1C4h 0x00000084 jmp 00007FFA9039B2D2h 0x00000086 test ch, dh 0x00000088 mov dword ptr [ebp+00000274h], edi 0x0000008e mov edi, ecx 0x00000090 push edi 0x00000091 mov edi, dword ptr [ebp+00000274h] 0x00000097 call 00007FFA9039B2E4h 0x0000009c call 00007FFA9039B2F8h 0x000000a1 lfence 0x000000a4 mov edx, 3126F457h 0x000000a9 xor edx, A11635D2h 0x000000af xor edx, 122A2AF9h 0x000000b5 xor edx, FDE4EB68h 0x000000bb mov edx, dword ptr [edx] 0x000000bd lfence 0x000000c0 ret 0x000000c1 mov esi, edx 0x000000c3 pushad 0x000000c4 rdtsc
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 00000000011263DB second address: 00000000011263DB instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e mov eax, 179B936Ch 0x00000013 xor eax, 12709E28h 0x00000018 add eax, 314D5628h 0x0000001d sub eax, 3738636Bh 0x00000022 cpuid 0x00000024 bt ecx, 1Fh 0x00000028 jc 00007FFA90371EA8h 0x0000002e popad 0x0000002f call 00007FFA9036EAB3h 0x00000034 lfence 0x00000037 rdtsc
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001121FB1 second address: 0000000001121FB1 instructions:
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001123F9B second address: 0000000001123F9B instructions:
          Source: C:\Users\user\subfolder1\filename1.exeRDTSC instruction interceptor: First address: 0000000002A96090 second address: 0000000002A96090 instructions: 0x00000000 rdtsc 0x00000002 mov eax, D06691AFh 0x00000007 xor eax, 51795B17h 0x0000000c sub eax, E89895FEh 0x00000011 sub eax, 988734B9h 0x00000016 cpuid 0x00000018 jmp 00007FFA9039B2C6h 0x0000001a test bx, 62F2h 0x0000001f popad 0x00000020 call 00007FFA9039B27Ch 0x00000025 lfence 0x00000028 mov edx, 3126F457h 0x0000002d xor edx, A11635D2h 0x00000033 xor edx, 122A2AF9h 0x00000039 xor edx, FDE4EB68h 0x0000003f mov edx, dword ptr [edx] 0x00000041 lfence 0x00000044 ret 0x00000045 cmp dh, ch 0x00000047 sub edx, esi 0x00000049 ret 0x0000004a test ah, dh 0x0000004c pop ecx 0x0000004d add edi, edx 0x0000004f dec ecx 0x00000050 mov dword ptr [ebp+0000017Ch], 339F83C1h 0x0000005a sub dword ptr [ebp+0000017Ch], 00B60B54h 0x00000064 sub dword ptr [ebp+0000017Ch], 2594365Ah 0x0000006e add dword ptr [ebp+0000017Ch], F2AABDEDh 0x00000078 cmp ecx, dword ptr [ebp+0000017Ch] 0x0000007e jne 00007FFA9039B1C4h 0x00000084 jmp 00007FFA9039B2D2h 0x00000086 test ch, dh 0x00000088 mov dword ptr [ebp+00000274h], edi 0x0000008e mov edi, ecx 0x00000090 push edi 0x00000091 mov edi, dword ptr [ebp+00000274h] 0x00000097 call 00007FFA9039B2E4h 0x0000009c call 00007FFA9039B2F8h 0x000000a1 lfence 0x000000a4 mov edx, 3126F457h 0x000000a9 xor edx, A11635D2h 0x000000af xor edx, 122A2AF9h 0x000000b5 xor edx, FDE4EB68h 0x000000bb mov edx, dword ptr [edx] 0x000000bd lfence 0x000000c0 ret 0x000000c1 mov esi, edx 0x000000c3 pushad 0x000000c4 rdtsc
          Source: C:\Users\user\subfolder1\filename1.exeRDTSC instruction interceptor: First address: 0000000002AE6090 second address: 0000000002AE6090 instructions: 0x00000000 rdtsc 0x00000002 mov eax, D06691AFh 0x00000007 xor eax, 51795B17h 0x0000000c sub eax, E89895FEh 0x00000011 sub eax, 988734B9h 0x00000016 cpuid 0x00000018 jmp 00007FFA9036EA76h 0x0000001a test bx, 62F2h 0x0000001f popad 0x00000020 call 00007FFA9036EA2Ch 0x00000025 lfence 0x00000028 mov edx, 3126F457h 0x0000002d xor edx, A11635D2h 0x00000033 xor edx, 122A2AF9h 0x00000039 xor edx, FDE4EB68h 0x0000003f mov edx, dword ptr [edx] 0x00000041 lfence 0x00000044 ret 0x00000045 cmp dh, ch 0x00000047 sub edx, esi 0x00000049 ret 0x0000004a test ah, dh 0x0000004c pop ecx 0x0000004d add edi, edx 0x0000004f dec ecx 0x00000050 mov dword ptr [ebp+0000017Ch], 339F83C1h 0x0000005a sub dword ptr [ebp+0000017Ch], 00B60B54h 0x00000064 sub dword ptr [ebp+0000017Ch], 2594365Ah 0x0000006e add dword ptr [ebp+0000017Ch], F2AABDEDh 0x00000078 cmp ecx, dword ptr [ebp+0000017Ch] 0x0000007e jne 00007FFA9036E974h 0x00000084 jmp 00007FFA9036EA82h 0x00000086 test ch, dh 0x00000088 mov dword ptr [ebp+00000274h], edi 0x0000008e mov edi, ecx 0x00000090 push edi 0x00000091 mov edi, dword ptr [ebp+00000274h] 0x00000097 call 00007FFA9036EA94h 0x0000009c call 00007FFA9036EAA8h 0x000000a1 lfence 0x000000a4 mov edx, 3126F457h 0x000000a9 xor edx, A11635D2h 0x000000af xor edx, 122A2AF9h 0x000000b5 xor edx, FDE4EB68h 0x000000bb mov edx, dword ptr [edx] 0x000000bd lfence 0x000000c0 ret 0x000000c1 mov esi, edx 0x000000c3 pushad 0x000000c4 rdtsc
          Source: C:\Users\user\subfolder1\filename1.exeRDTSC instruction interceptor: First address: 0000000002A963DB second address: 0000000002A963DB instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e mov eax, 179B936Ch 0x00000013 xor eax, 12709E28h 0x00000018 add eax, 314D5628h 0x0000001d sub eax, 3738636Bh 0x00000022 cpuid 0x00000024 bt ecx, 1Fh 0x00000028 jc 00007FFA9039E6F8h 0x0000002e popad 0x0000002f call 00007FFA9039B303h 0x00000034 lfence 0x00000037 rdtsc
          Source: C:\Users\user\subfolder1\filename1.exeRDTSC instruction interceptor: First address: 0000000002A911D1 second address: 0000000002A9734D instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a call 00007FFA90374B8Eh 0x0000000f pushad 0x00000010 lfence 0x00000013 rdtsc
          Source: C:\Users\user\subfolder1\filename1.exeRDTSC instruction interceptor: First address: 0000000002AE63DB second address: 0000000002AE63DB instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e mov eax, 179B936Ch 0x00000013 xor eax, 12709E28h 0x00000018 add eax, 314D5628h 0x0000001d sub eax, 3738636Bh 0x00000022 cpuid 0x00000024 bt ecx, 1Fh 0x00000028 jc 00007FFA9039E6F8h 0x0000002e popad 0x0000002f call 00007FFA9039B303h 0x00000034 lfence 0x00000037 rdtsc
          Source: C:\Users\user\subfolder1\filename1.exeRDTSC instruction interceptor: First address: 0000000002AE11D1 second address: 0000000002AE734D instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a call 00007FFA90374B8Eh 0x0000000f pushad 0x00000010 lfence 0x00000013 rdtsc
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001306090 second address: 0000000001306090 instructions: 0x00000000 rdtsc 0x00000002 mov eax, D06691AFh 0x00000007 xor eax, 51795B17h 0x0000000c sub eax, E89895FEh 0x00000011 sub eax, 988734B9h 0x00000016 cpuid 0x00000018 jmp 00007FFA9039B2C6h 0x0000001a test bx, 62F2h 0x0000001f popad 0x00000020 call 00007FFA9039B27Ch 0x00000025 lfence 0x00000028 mov edx, 3126F457h 0x0000002d xor edx, A11635D2h 0x00000033 xor edx, 122A2AF9h 0x00000039 xor edx, FDE4EB68h 0x0000003f mov edx, dword ptr [edx] 0x00000041 lfence 0x00000044 ret 0x00000045 cmp dh, ch 0x00000047 sub edx, esi 0x00000049 ret 0x0000004a test ah, dh 0x0000004c pop ecx 0x0000004d add edi, edx 0x0000004f dec ecx 0x00000050 mov dword ptr [ebp+0000017Ch], 339F83C1h 0x0000005a sub dword ptr [ebp+0000017Ch], 00B60B54h 0x00000064 sub dword ptr [ebp+0000017Ch], 2594365Ah 0x0000006e add dword ptr [ebp+0000017Ch], F2AABDEDh 0x00000078 cmp ecx, dword ptr [ebp+0000017Ch] 0x0000007e jne 00007FFA9039B1C4h 0x00000084 jmp 00007FFA9039B2D2h 0x00000086 test ch, dh 0x00000088 mov dword ptr [ebp+00000274h], edi 0x0000008e mov edi, ecx 0x00000090 push edi 0x00000091 mov edi, dword ptr [ebp+00000274h] 0x00000097 call 00007FFA9039B2E4h 0x0000009c call 00007FFA9039B2F8h 0x000000a1 lfence 0x000000a4 mov edx, 3126F457h 0x000000a9 xor edx, A11635D2h 0x000000af xor edx, 122A2AF9h 0x000000b5 xor edx, FDE4EB68h 0x000000bb mov edx, dword ptr [edx] 0x000000bd lfence 0x000000c0 ret 0x000000c1 mov esi, edx 0x000000c3 pushad 0x000000c4 rdtsc
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000D06090 second address: 0000000000D06090 instructions: 0x00000000 rdtsc 0x00000002 mov eax, D06691AFh 0x00000007 xor eax, 51795B17h 0x0000000c sub eax, E89895FEh 0x00000011 sub eax, 988734B9h 0x00000016 cpuid 0x00000018 jmp 00007FFA9036EA76h 0x0000001a test bx, 62F2h 0x0000001f popad 0x00000020 call 00007FFA9036EA2Ch 0x00000025 lfence 0x00000028 mov edx, 3126F457h 0x0000002d xor edx, A11635D2h 0x00000033 xor edx, 122A2AF9h 0x00000039 xor edx, FDE4EB68h 0x0000003f mov edx, dword ptr [edx] 0x00000041 lfence 0x00000044 ret 0x00000045 cmp dh, ch 0x00000047 sub edx, esi 0x00000049 ret 0x0000004a test ah, dh 0x0000004c pop ecx 0x0000004d add edi, edx 0x0000004f dec ecx 0x00000050 mov dword ptr [ebp+0000017Ch], 339F83C1h 0x0000005a sub dword ptr [ebp+0000017Ch], 00B60B54h 0x00000064 sub dword ptr [ebp+0000017Ch], 2594365Ah 0x0000006e add dword ptr [ebp+0000017Ch], F2AABDEDh 0x00000078 cmp ecx, dword ptr [ebp+0000017Ch] 0x0000007e jne 00007FFA9036E974h 0x00000084 jmp 00007FFA9036EA82h 0x00000086 test ch, dh 0x00000088 mov dword ptr [ebp+00000274h], edi 0x0000008e mov edi, ecx 0x00000090 push edi 0x00000091 mov edi, dword ptr [ebp+00000274h] 0x00000097 call 00007FFA9036EA94h 0x0000009c call 00007FFA9036EAA8h 0x000000a1 lfence 0x000000a4 mov edx, 3126F457h 0x000000a9 xor edx, A11635D2h 0x000000af xor edx, 122A2AF9h 0x000000b5 xor edx, FDE4EB68h 0x000000bb mov edx, dword ptr [edx] 0x000000bd lfence 0x000000c0 ret 0x000000c1 mov esi, edx 0x000000c3 pushad 0x000000c4 rdtsc
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 00000000013063DB second address: 00000000013063DB instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e mov eax, 179B936Ch 0x00000013 xor eax, 12709E28h 0x00000018 add eax, 314D5628h 0x0000001d sub eax, 3738636Bh 0x00000022 cpuid 0x00000024 bt ecx, 1Fh 0x00000028 jc 00007FFA9039E6F8h 0x0000002e popad 0x0000002f call 00007FFA9039B303h 0x00000034 lfence 0x00000037 rdtsc
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000D063DB second address: 0000000000D063DB instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e mov eax, 179B936Ch 0x00000013 xor eax, 12709E28h 0x00000018 add eax, 314D5628h 0x0000001d sub eax, 3738636Bh 0x00000022 cpuid 0x00000024 bt ecx, 1Fh 0x00000028 jc 00007FFA90371EA8h 0x0000002e popad 0x0000002f call 00007FFA9036EAB3h 0x00000034 lfence 0x00000037 rdtsc
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001303F9B second address: 0000000001303F9B instructions:
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000D03F9B second address: 0000000000D03F9B instructions:
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWindow / User API: threadDelayed 1085
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWindow / User API: threadDelayed 846
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWindow / User API: foregroundWindowGot 1268
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWindow / User API: foregroundWindowGot 511
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 1124Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 1124Thread sleep time: -54250s >= -30000s
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5156Thread sleep time: -60000s >= -30000s
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 1528Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 6076Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
          Source: 7keerHhHvn.exe, 00000000.00000002.453217523.0000000003C50000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32USERPROFILE=windir=\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe\syswow64\msvbvm60.dll
          Source: RegAsm.exe, 00000026.00000002.762525078.0000000000FD0000.00000004.00000001.sdmp, RegAsm.exe, 00000029.00000002.774677046.00000000009F0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32USERPROFILE=\filename1.exe\subfolder1Software\Microsoft\Windows\CurrentVersion\RunOnceStartup keyhttps://onedrive.live.com/download?cid=6D6F745EC8C6F9D8&resid=6D6F745EC8C6F9D8%21108&authkey=AKJRgu_G9cq6Trkwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
          Source: filename1.exe, 0000001B.00000002.756747203.0000000003DB0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32USERPROFILE=windir=\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe\syswow64\msvbvm60.dllwindir=\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe\syswow64\msvbvm60.dllwindir=\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe\syswow64\msvbvm60.dll
          Source: RegAsm.exe, 00000026.00000002.763005730.0000000001755000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
          Source: 7keerHhHvn.exe, 00000000.00000002.453217523.0000000003C50000.00000004.00000001.sdmp, filename1.exe, 0000001B.00000002.756747203.0000000003DB0000.00000004.00000001.sdmp, filename1.exe, 0000001C.00000002.767000852.0000000003C20000.00000004.00000001.sdmp, RegAsm.exe, 00000026.00000002.762525078.0000000000FD0000.00000004.00000001.sdmp, RegAsm.exe, 00000029.00000002.774677046.00000000009F0000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: filename1.exe, 0000001C.00000002.767000852.0000000003C20000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32USERPROFILE=windir=\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe\syswow64\msvbvm60.dllwindir=\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe\syswow64\msvbvm60.dll
          Source: RegAsm.exe, 00000026.00000002.762926600.000000000170B000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW0!v
          Source: C:\Users\user\Desktop\7keerHhHvn.exeSystem information queried: ModuleInformation
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information queried: ProcessInformation

          Anti Debugging:

          barindex
          Hides threads from debuggersShow sources
          Source: C:\Users\user\Desktop\7keerHhHvn.exeThread information set: HideFromDebugger
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
          Source: C:\Users\user\subfolder1\filename1.exeThread information set: HideFromDebugger
          Source: C:\Users\user\subfolder1\filename1.exeThread information set: HideFromDebugger
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
          Source: C:\Users\user\Desktop\7keerHhHvn.exeProcess queried: DebugPort
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
          Source: C:\Users\user\subfolder1\filename1.exeProcess queried: DebugPort
          Source: C:\Users\user\subfolder1\filename1.exeProcess queried: DebugPort
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess token adjusted: Debug
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Writes to foreign memory regionsShow sources
          Source: C:\Users\user\Desktop\7keerHhHvn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe base: 1120000
          Source: C:\Users\user\subfolder1\filename1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe base: 1300000
          Source: C:\Users\user\subfolder1\filename1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe base: D00000
          Source: C:\Users\user\Desktop\7keerHhHvn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\7keerHhHvn.exe'
          Source: C:\Users\user\subfolder1\filename1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Users\user\subfolder1\filename1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Users\user\subfolder1\filename1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Users\user\subfolder1\filename1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Users\user\subfolder1\filename1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\subfolder1\filename1.exe'
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          GuLoader behavior detectedShow sources
          Source: Initial fileSignature Results: GuLoader behavior
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f219616.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ebfe44c.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f21e44c.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ebf9616.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f21e44c.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ec02a75.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f222a75.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ebfe44c.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000029.00000002.780177556.000000001EBB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000026.00000002.767234010.000000001F1D1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000029.00000002.780062745.000000001DBB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000026.00000002.767134795.000000001E1D1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5904, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4736, type: MEMORYSTR

          Remote Access Functionality:

          barindex
          Detected Nanocore RatShow sources
          Source: RegAsm.exe, 00000026.00000002.767234010.000000001F1D1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: RegAsm.exe, 00000026.00000002.767234010.000000001F1D1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: RegAsm.exe, 00000029.00000002.780177556.000000001EBB1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: RegAsm.exe, 00000029.00000002.780177556.000000001EBB1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f219616.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ebfe44c.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f21e44c.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ebf9616.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f21e44c.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ec02a75.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 38.2.RegAsm.exe.1f222a75.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 41.2.RegAsm.exe.1ebfe44c.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000029.00000002.780177556.000000001EBB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000026.00000002.767234010.000000001F1D1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000029.00000002.780062745.000000001DBB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000026.00000002.767134795.000000001E1D1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5904, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4736, type: MEMORYSTR

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationRegistry Run Keys / Startup Folder1Process Injection111Masquerading1Input Capture21Security Software Discovery611Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobDLL Side-Loading1Registry Run Keys / Startup Folder1Disable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)DLL Side-Loading1Virtualization/Sandbox Evasion231Security Account ManagerVirtualization/Sandbox Evasion231SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection111NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsDLL Side-Loading1DCSyncSystem Information Discovery23Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 458550 Sample: 7keerHhHvn.exe Startdate: 03/08/2021 Architecture: WINDOWS Score: 100 65 Found malware configuration 2->65 67 Malicious sample detected (through community Yara rule) 2->67 69 Multi AV Scanner detection for submitted file 2->69 71 9 other signatures 2->71 7 7keerHhHvn.exe 2 2->7         started        10 filename1.exe 2 2->10         started        12 filename1.exe 2 2->12         started        process3 signatures4 73 Writes to foreign memory regions 7->73 75 Detected RDTSC dummy instruction sequence (likely for instruction hammering) 7->75 77 Tries to detect Any.run 7->77 14 RegAsm.exe 1 17 7->14         started        79 Multi AV Scanner detection for dropped file 10->79 81 Machine Learning detection for dropped file 10->81 83 Tries to detect virtualization through RDTSC time measurements 10->83 19 RegAsm.exe 11 10->19         started        21 RegAsm.exe 10->21         started        23 RegAsm.exe 10->23         started        85 Hides threads from debuggers 12->85 25 RegAsm.exe 10 12->25         started        27 RegAsm.exe 12->27         started        process5 dnsIp6 39 mexi11.ddns.net 194.5.98.74, 4040, 49739, 49743 DANILENKODE Netherlands 14->39 41 127.0.0.1 unknown unknown 14->41 47 3 other IPs or domains 14->47 35 C:\Users\user\subfolder1\filename1.exe, PE32 14->35 dropped 37 C:\Users\user\AppData\Roaming\...\run.dat, data 14->37 dropped 53 Detected RDTSC dummy instruction sequence (likely for instruction hammering) 14->53 55 Tries to detect Any.run 14->55 57 Tries to detect virtualization through RDTSC time measurements 14->57 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->59 29 conhost.exe 14->29         started        43 vt8dlg.bn.files.1drv.com 19->43 49 2 other IPs or domains 19->49 61 Hides threads from debuggers 19->61 31 conhost.exe 19->31         started        45 vt8dlg.bn.files.1drv.com 25->45 51 2 other IPs or domains 25->51 33 conhost.exe 25->33         started        file7 63 Uses dynamic DNS services 39->63 signatures8 process9

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          7keerHhHvn.exe26%VirustotalBrowse
          7keerHhHvn.exe27%ReversingLabsWin32.Trojan.AgentTesla
          7keerHhHvn.exe100%Joe Sandbox ML

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\subfolder1\filename1.exe100%Joe Sandbox ML
          C:\Users\user\subfolder1\filename1.exe31%ReversingLabsWin32.Trojan.AgentTesla

          Unpacked PE Files

          No Antivirus matches

          Domains

          SourceDetectionScannerLabelLink
          mexi11.ddns.net5%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          mexi11.ddns.net5%VirustotalBrowse
          mexi11.ddns.net0%Avira URL Cloudsafe
          127.0.0.10%VirustotalBrowse
          127.0.0.10%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          mexi11.ddns.net
          194.5.98.74
          truetrueunknown
          onedrive.live.com
          unknown
          unknownfalse
            high
            vt8dlg.bn.files.1drv.com
            unknown
            unknownfalse
              high

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              mexi11.ddns.nettrue
              • 5%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              127.0.0.1true
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              https://onedrive.live.com/downloadRegAsm.exe, 00000026.00000002.762926600.000000000170B000.00000004.00000020.sdmpfalse
                high
                https://vt8dlg.bn.files.1drv.com/RegAsm.exe, 00000026.00000002.762977823.0000000001739000.00000004.00000020.sdmpfalse
                  high
                  https://onedrive.live.com/pRegAsm.exe, 00000026.00000002.762926600.000000000170B000.00000004.00000020.sdmpfalse
                    high
                    https://onedrive.live.com/download?cid=6D6F745EC8C6F9D8&resid=6D6F745EC8C6F9D8%21108&authkey=AKJRgu_RegAsm.exe, 00000029.00000002.774677046.00000000009F0000.00000004.00000001.sdmpfalse
                      high
                      https://onedrive.live.com/RegAsm.exe, 00000026.00000002.762926600.000000000170B000.00000004.00000020.sdmpfalse
                        high
                        https://vt8dlg.bn.files.1drv.com/y4mrn2hczejFxJUaC7t02Lzk3UBxBtUoFTWBuN2lZyzI4ePO5huRlr2N1MK6Md6g2leRegAsm.exe, 00000026.00000002.763005730.0000000001755000.00000004.00000020.sdmpfalse
                          high

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          194.5.98.74
                          mexi11.ddns.netNetherlands
                          208476DANILENKODEtrue

                          Private

                          IP
                          127.0.0.1

                          General Information

                          Joe Sandbox Version:33.0.0 White Diamond
                          Analysis ID:458550
                          Start date:03.08.2021
                          Start time:14:44:19
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 14m 6s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:7keerHhHvn.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Run name:Suspected Instruction Hammering Hide Perf
                          Number of analysed new started processes analysed:44
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@18/3@126/2
                          EGA Information:Failed
                          HDC Information:
                          • Successful, ratio: 5.4% (good quality ratio 1.6%)
                          • Quality average: 13.5%
                          • Quality standard deviation: 21.5%
                          HCA Information:
                          • Successful, ratio: 89%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .exe
                          Warnings:
                          Show All
                          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 40.88.32.150, 23.211.6.115, 104.43.139.144, 23.211.4.86, 20.82.210.154, 173.222.108.226, 173.222.108.210, 40.112.88.60, 80.67.82.211, 80.67.82.235, 13.107.43.13, 13.107.43.12, 20.54.110.249, 13.107.42.13, 13.107.42.12, 40.126.31.3, 40.126.31.5, 40.126.31.9, 40.126.31.2, 20.190.159.137, 20.190.159.131, 40.126.31.136, 40.126.31.7, 20.73.194.208, 40.127.240.158, 23.203.67.116
                          • Excluded domains from analysis (whitelisted): www.tm.lg.prod.aadmsa.akadns.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, www.tm.a.prd.aadg.trafficmanager.net, cdn.onenote.net.edgekey.net, odc-bn-files-geo.onedrive.akadns.net, skypedataprdcoleus15.cloudapp.net, l-0003.l-msedge.net, login.live.com, audownload.windowsupdate.nsatc.net, watson.telemetry.microsoft.com, au-bg-shim.trafficmanager.net, fs.microsoft.com, bn-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, odc-bn-files-brs.onedrive.akadns.net, skypedataprdcolcus16.cloudapp.net, settingsfd-geo.trafficmanager.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, e1553.dspg.akamaiedge.net, au.download.windowsupdate.com.edgesuite.net, odc-web-brs.onedrive.akadns.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, l-0004.dc-msedge.net, l-0004.l-msedge.net, e12564.dspb.akamaiedge.net, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, cdn.onenote.net, odc-web-geo.onedrive.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, l-0003.dc-msedge.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, settings-win.data.microsoft.com, a767.dscg3.akamai.net, login.msa.msidentity.com, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          14:47:00AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\subfolder1\filename1.exe
                          14:47:01API Interceptor2932x Sleep call for process: RegAsm.exe modified
                          14:47:08AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\subfolder1\filename1.exe

                          Joe Sandbox View / Context

                          IPs

                          No context

                          Domains

                          No context

                          ASN

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          DANILENKODEPurchase.exeGet hashmaliciousBrowse
                          • 194.5.97.150
                          Fec9qUX4at.exeGet hashmaliciousBrowse
                          • 194.5.97.128
                          Ordonnance PL-PB39-210706,pdf.exeGet hashmaliciousBrowse
                          • 194.5.98.7
                          Tzcyxxestkakhuvtmvfdserywturrfjrye.exeGet hashmaliciousBrowse
                          • 194.5.98.72
                          LzbZ4T1iV8.exeGet hashmaliciousBrowse
                          • 194.5.97.128
                          kGSHiWbgq9.exeGet hashmaliciousBrowse
                          • 194.5.97.128
                          loKmeabs9V.exeGet hashmaliciousBrowse
                          • 194.5.97.128
                          1niECmfIcE.exeGet hashmaliciousBrowse
                          • 194.5.97.94
                          Nuzbcdoajgupgalxelbnohzzeonlplvuro.exeGet hashmaliciousBrowse
                          • 194.5.98.7
                          RueoUfi1MZ.exeGet hashmaliciousBrowse
                          • 194.5.98.3
                          Departamento de contadores Consejos de pago 0.exeGet hashmaliciousBrowse
                          • 194.5.98.7
                          04_extracted.exeGet hashmaliciousBrowse
                          • 194.5.97.18
                          scanorder01321.jarGet hashmaliciousBrowse
                          • 194.5.98.243
                          scanorder01321.jarGet hashmaliciousBrowse
                          • 194.5.98.243
                          PO.exeGet hashmaliciousBrowse
                          • 194.5.98.23
                          PO B4007121.exeGet hashmaliciousBrowse
                          • 194.5.98.7
                          WzOSphO1Np.exeGet hashmaliciousBrowse
                          • 194.5.98.107
                          QUOTATION-007222021.exeGet hashmaliciousBrowse
                          • 194.5.97.145
                          PO B4007121.exeGet hashmaliciousBrowse
                          • 194.5.98.7
                          ORDER407-395.exeGet hashmaliciousBrowse
                          • 194.5.98.23

                          JA3 Fingerprints

                          No context

                          Dropped Files

                          No context

                          Created / dropped Files

                          C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\RegAsm.exe.log
                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):525
                          Entropy (8bit):5.2874233355119316
                          Encrypted:false
                          SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                          MD5:61CCF53571C9ABA6511D696CB0D32E45
                          SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                          SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                          SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                          Malicious:false
                          Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):8
                          Entropy (8bit):3.0
                          Encrypted:false
                          SSDEEP:3:Fd5tz8:n5tz8
                          MD5:0F6770A104CD85E855C5A5EA85348B17
                          SHA1:CD431CBC296446258B44671D7E72667C1B2E37E0
                          SHA-256:07687E2CAB23D13E10044B95462C52C12C30F41AED319621FEEBEE9F111D983B
                          SHA-512:85689CC95B8D0DD414238D61A1257CAD7228FED52F2BC47DA87571B6725DBBCB2FE3C6F3F72FC9CE73CDD2FAFB34CD33C9C32C28EF7DD2BBA24038D2B6437BB4
                          Malicious:true
                          Preview: Y.8..V.H
                          C:\Users\user\subfolder1\filename1.exe
                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):143360
                          Entropy (8bit):6.460043863848558
                          Encrypted:false
                          SSDEEP:3072:S5CCbi+/47tQatuMBmrBeMn5m4vvt6g58:Ai+/g/tuMQlzVntV
                          MD5:782783574D2D4B67666B77B686C2E673
                          SHA1:8EEEC0963FA7EAF3115335C03315ECC203BABF9B
                          SHA-256:0D2AEB4A2F85B9BF8AE3990A3DDEA5A242D0DB5186263E3CCF2435BBC48EC478
                          SHA-512:1E500C34D0A1CB7D53661A5759C9D1325A119D86813FD4204F6586B5BF5D16FBF774C694AB6AE367567C38FA38077DD8F1B47991245AFA4B6BA5292B235839FA
                          Malicious:true
                          Antivirus:
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 31%
                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L...S..Q.....................0....................@..........................@......1...........................................(....0.. ...................................................................(... ....................................text............................... ..`.data...............................@....rsrc... ....0....... ..............@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................

                          Static File Info

                          General

                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):6.460043863848558
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.15%
                          • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:7keerHhHvn.exe
                          File size:143360
                          MD5:782783574d2d4b67666b77b686c2e673
                          SHA1:8eeec0963fa7eaf3115335c03315ecc203babf9b
                          SHA256:0d2aeb4a2f85b9bf8ae3990a3ddea5a242d0db5186263e3ccf2435bbc48ec478
                          SHA512:1e500c34d0a1cb7d53661a5759c9d1325a119d86813fd4204f6586b5bf5d16fbf774c694ab6ae367567c38fa38077dd8f1b47991245afa4b6ba5292b235839fa
                          SSDEEP:3072:S5CCbi+/47tQatuMBmrBeMn5m4vvt6g58:Ai+/g/tuMQlzVntV
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L...S..Q.....................0....................@................

                          File Icon

                          Icon Hash:c4e8c8cccce0e8e8

                          Static PE Info

                          General

                          Entrypoint:0x4014b4
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                          DLL Characteristics:
                          Time Stamp:0x51ACB753 [Mon Jun 3 15:33:39 2013 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:fef384fc3a66a559dff455f07d497ca0

                          Entrypoint Preview

                          Instruction
                          push 00401F54h
                          call 00007FFA90E7A583h
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          xor byte ptr [eax], al
                          add byte ptr [eax], al
                          inc eax
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax-67h], dl
                          sbb esi, dword ptr [ebx+4EFEB052h]
                          stosb
                          sbb cl, byte ptr [ecx+74h]
                          ret
                          test dword ptr [edx], esi
                          in al, dx
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add dword ptr [eax], eax
                          add byte ptr [eax], al
                          inc ecx
                          add byte ptr [eax], ah
                          or byte ptr [ecx+00h], al
                          inc esi
                          popad
                          insb
                          jc 00007FFA90E7A5F5h
                          insb
                          jne 00007FFA90E7A5FFh
                          imul esi, dword ptr [eax+eax], 00000000h
                          add byte ptr [eax], al
                          dec esp
                          xor dword ptr [eax], eax
                          add bh, dl
                          movsb
                          add al, 03h
                          pop eax
                          movsd
                          test byte ptr [ebx-43h], 00000048h
                          dec eax
                          inc ebp
                          ror dl, 0000002Fh
                          and al, byte ptr [edx+6Eh]
                          mov al, 41h
                          fistp word ptr [ecx+43h]
                          xchg eax, edi
                          sti
                          push ebx
                          mov ebx, 3AE1F6F1h
                          dec edi
                          lodsd
                          xor ebx, dword ptr [ecx-48EE309Ah]
                          or al, 00h
                          stosb
                          add byte ptr [eax-2Dh], ah
                          xchg eax, ebx
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          adc al, 09h
                          add byte ptr [eax], al
                          wbinvd
                          add byte ptr [eax], al
                          add byte ptr [esi], al
                          add byte ptr [ebp+4Fh], cl
                          inc ecx
                          dec esi
                          dec ecx
                          inc esi
                          add byte ptr [54000901h], cl
                          jne 00007FFA90E7A600h
                          insd
                          je 00007FFA90E7A5F4h

                          Data Directories

                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x206f40x28.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x230000xc20.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                          IMAGE_DIRECTORY_ENTRY_IAT0x10000x190.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                          Sections

                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x1fcec0x20000False0.384429931641data6.7545432225IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                          .data0x210000x11bc0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                          .rsrc0x230000xc200x1000False0.314453125data3.28015845724IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                          Resources

                          NameRVASizeTypeLanguageCountry
                          RT_ICON0x233780x8a8data
                          RT_GROUP_ICON0x233640x14data
                          RT_VERSION0x230f00x274dataChineseTaiwan

                          Imports

                          DLLImport
                          MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaAryMove, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaVarForInit, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaR4Str, DllFunctionCall, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, __vbaR8Str, __vbaVar2Vec, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaLateMemCall, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, __vbaVarForNext, _CIexp, __vbaFreeObj, __vbaFreeStr

                          Version Infos

                          DescriptionData
                          Translation0x0404 0x04b0
                          InternalNameAbsurditiesun
                          FileVersion1.00
                          CompanyNameIntersection Road
                          CommentsIntersection Road
                          ProductNameUnrapedb6
                          ProductVersion1.00
                          OriginalFilenameAbsurditiesun.exe

                          Possible Origin

                          Language of compilation systemCountry where language is spokenMap
                          ChineseTaiwan

                          Network Behavior

                          Network Port Distribution

                          TCP Packets

                          TimestampSource PortDest PortSource IPDest IP
                          Aug 3, 2021 14:47:35.739195108 CEST497394040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:47:35.783749104 CEST404049739194.5.98.74192.168.2.3
                          Aug 3, 2021 14:47:36.352982998 CEST497394040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:47:36.397624969 CEST404049739194.5.98.74192.168.2.3
                          Aug 3, 2021 14:47:37.040594101 CEST497394040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:47:37.085175037 CEST404049739194.5.98.74192.168.2.3
                          Aug 3, 2021 14:48:14.477144957 CEST497434040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:48:14.521774054 CEST404049743194.5.98.74192.168.2.3
                          Aug 3, 2021 14:48:15.034255028 CEST497434040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:48:15.078751087 CEST404049743194.5.98.74192.168.2.3
                          Aug 3, 2021 14:48:15.648817062 CEST497434040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:48:15.693285942 CEST404049743194.5.98.74192.168.2.3
                          Aug 3, 2021 14:48:59.419826031 CEST497514040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:48:59.465426922 CEST404049751194.5.98.74192.168.2.3
                          Aug 3, 2021 14:49:00.058918953 CEST497514040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:49:00.105498075 CEST404049751194.5.98.74192.168.2.3
                          Aug 3, 2021 14:49:00.746720076 CEST497514040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:49:00.792035103 CEST404049751194.5.98.74192.168.2.3
                          Aug 3, 2021 14:49:44.824145079 CEST497594040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:49:44.870352983 CEST404049759194.5.98.74192.168.2.3
                          Aug 3, 2021 14:49:45.375174999 CEST497594040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:49:45.426491022 CEST404049759194.5.98.74192.168.2.3
                          Aug 3, 2021 14:49:45.937864065 CEST497594040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:49:45.981906891 CEST404049759194.5.98.74192.168.2.3
                          Aug 3, 2021 14:50:15.158128023 CEST497654040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:50:15.202559948 CEST404049765194.5.98.74192.168.2.3
                          Aug 3, 2021 14:50:15.706037045 CEST497654040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:50:15.756139994 CEST404049765194.5.98.74192.168.2.3
                          Aug 3, 2021 14:50:16.268457890 CEST497654040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:50:16.312866926 CEST404049765194.5.98.74192.168.2.3
                          Aug 3, 2021 14:50:45.222585917 CEST497664040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:50:45.279006004 CEST404049766194.5.98.74192.168.2.3
                          Aug 3, 2021 14:50:45.786555052 CEST497664040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:50:45.842958927 CEST404049766194.5.98.74192.168.2.3
                          Aug 3, 2021 14:50:46.349107981 CEST497664040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:50:46.407428026 CEST404049766194.5.98.74192.168.2.3
                          Aug 3, 2021 14:51:30.576817036 CEST497704040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:51:30.620276928 CEST404049770194.5.98.74192.168.2.3
                          Aug 3, 2021 14:51:31.134229898 CEST497704040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:51:31.177716017 CEST404049770194.5.98.74192.168.2.3
                          Aug 3, 2021 14:51:31.681015968 CEST497704040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:51:31.724941015 CEST404049770194.5.98.74192.168.2.3
                          Aug 3, 2021 14:52:00.560456038 CEST497714040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:52:00.615791082 CEST404049771194.5.98.74192.168.2.3
                          Aug 3, 2021 14:52:01.121059895 CEST497714040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:52:01.176704884 CEST404049771194.5.98.74192.168.2.3
                          Aug 3, 2021 14:52:01.683590889 CEST497714040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:52:01.739079952 CEST404049771194.5.98.74192.168.2.3
                          Aug 3, 2021 14:52:30.593358040 CEST497734040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:52:30.636796951 CEST404049773194.5.98.74192.168.2.3
                          Aug 3, 2021 14:52:31.139195919 CEST497734040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:52:31.183046103 CEST404049773194.5.98.74192.168.2.3
                          Aug 3, 2021 14:52:31.686194897 CEST497734040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:52:31.731462002 CEST404049773194.5.98.74192.168.2.3
                          Aug 3, 2021 14:53:15.246557951 CEST497794040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:53:15.302040100 CEST404049779194.5.98.74192.168.2.3
                          Aug 3, 2021 14:53:15.814881086 CEST497794040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:53:15.870394945 CEST404049779194.5.98.74192.168.2.3
                          Aug 3, 2021 14:53:16.377656937 CEST497794040192.168.2.3194.5.98.74
                          Aug 3, 2021 14:53:16.434027910 CEST404049779194.5.98.74192.168.2.3

                          UDP Packets

                          TimestampSource PortDest PortSource IPDest IP
                          Aug 3, 2021 14:45:02.433785915 CEST5062053192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:02.459536076 CEST53506208.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:03.106939077 CEST6493853192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:03.132013083 CEST53649388.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:03.741242886 CEST6015253192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:03.766334057 CEST53601528.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:04.450599909 CEST5754453192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:04.478235960 CEST53575448.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:04.664549112 CEST5598453192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:04.704325914 CEST53559848.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:05.115405083 CEST6418553192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:05.141145945 CEST53641858.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:05.930788040 CEST6511053192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:05.956702948 CEST53651108.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:06.592334986 CEST5836153192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:06.619251966 CEST53583618.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:07.574091911 CEST6349253192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:07.601309061 CEST53634928.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:09.638709068 CEST6083153192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:09.663589001 CEST53608318.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:10.791352987 CEST6010053192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:10.824028015 CEST53601008.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:11.675386906 CEST5319553192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:11.700249910 CEST53531958.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:13.384774923 CEST5014153192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:13.412184954 CEST53501418.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:14.312062025 CEST5302353192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:14.340142012 CEST53530238.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:15.053843021 CEST4956353192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:15.081407070 CEST53495638.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:18.071397066 CEST5135253192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:18.098843098 CEST53513528.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:18.831847906 CEST5934953192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:18.858071089 CEST53593498.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:20.307502031 CEST5708453192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:20.334569931 CEST53570848.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:21.220947981 CEST5882353192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:21.256170034 CEST53588238.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:36.758276939 CEST5756853192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:36.795633078 CEST53575688.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:38.781929970 CEST5054053192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:38.825753927 CEST53505408.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:57.101054907 CEST5436653192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:57.136080027 CEST53543668.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:59.230046988 CEST5303453192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:59.262897015 CEST53530348.8.8.8192.168.2.3
                          Aug 3, 2021 14:45:59.322199106 CEST5776253192.168.2.38.8.8.8
                          Aug 3, 2021 14:45:59.358314037 CEST53577628.8.8.8192.168.2.3
                          Aug 3, 2021 14:46:03.310149908 CEST5543553192.168.2.38.8.8.8
                          Aug 3, 2021 14:46:03.360773087 CEST53554358.8.8.8192.168.2.3
                          Aug 3, 2021 14:46:16.367758036 CEST5071353192.168.2.38.8.8.8
                          Aug 3, 2021 14:46:16.416579962 CEST53507138.8.8.8192.168.2.3
                          Aug 3, 2021 14:46:23.900834084 CEST5613253192.168.2.38.8.8.8
                          Aug 3, 2021 14:46:23.936127901 CEST53561328.8.8.8192.168.2.3
                          Aug 3, 2021 14:46:54.769162893 CEST5898753192.168.2.38.8.8.8
                          Aug 3, 2021 14:46:54.801601887 CEST53589878.8.8.8192.168.2.3
                          Aug 3, 2021 14:46:57.343972921 CEST5657953192.168.2.38.8.8.8
                          Aug 3, 2021 14:46:57.385066986 CEST53565798.8.8.8192.168.2.3
                          Aug 3, 2021 14:46:59.369134903 CEST6063353192.168.2.38.8.8.8
                          Aug 3, 2021 14:46:59.405335903 CEST53606338.8.8.8192.168.2.3
                          Aug 3, 2021 14:47:00.197516918 CEST6129253192.168.2.38.8.8.8
                          Aug 3, 2021 14:47:00.252003908 CEST53612928.8.8.8192.168.2.3
                          Aug 3, 2021 14:47:04.296108007 CEST6361953192.168.2.337.235.1.174
                          Aug 3, 2021 14:47:05.292681932 CEST6361953192.168.2.337.235.1.174
                          Aug 3, 2021 14:47:06.242685080 CEST6361953192.168.2.337.235.1.174
                          Aug 3, 2021 14:47:08.242249966 CEST6361953192.168.2.337.235.1.174
                          Aug 3, 2021 14:47:12.354681015 CEST6361953192.168.2.337.235.1.174
                          Aug 3, 2021 14:47:16.907313108 CEST6493853192.168.2.337.235.1.177
                          Aug 3, 2021 14:47:17.946968079 CEST6493853192.168.2.337.235.1.177
                          Aug 3, 2021 14:47:18.976984024 CEST6493853192.168.2.337.235.1.177
                          Aug 3, 2021 14:47:21.649106979 CEST6493853192.168.2.337.235.1.177
                          Aug 3, 2021 14:47:26.166146040 CEST6493853192.168.2.337.235.1.177
                          Aug 3, 2021 14:47:35.621997118 CEST6194653192.168.2.38.8.8.8
                          Aug 3, 2021 14:47:35.656497002 CEST53619468.8.8.8192.168.2.3
                          Aug 3, 2021 14:47:42.986458063 CEST6491053192.168.2.337.235.1.174
                          Aug 3, 2021 14:47:43.999631882 CEST6491053192.168.2.337.235.1.174
                          Aug 3, 2021 14:47:45.011310101 CEST6491053192.168.2.337.235.1.174
                          Aug 3, 2021 14:47:48.230129004 CEST6491053192.168.2.337.235.1.174
                          Aug 3, 2021 14:47:52.277863979 CEST6491053192.168.2.337.235.1.174
                          Aug 3, 2021 14:48:01.229027033 CEST5212353192.168.2.337.235.1.177
                          Aug 3, 2021 14:48:02.343261957 CEST5212353192.168.2.337.235.1.177
                          Aug 3, 2021 14:48:03.368522882 CEST5212353192.168.2.337.235.1.177
                          Aug 3, 2021 14:48:05.399483919 CEST5212353192.168.2.337.235.1.177
                          Aug 3, 2021 14:48:06.761126995 CEST5613053192.168.2.38.8.8.8
                          Aug 3, 2021 14:48:06.802342892 CEST53561308.8.8.8192.168.2.3
                          Aug 3, 2021 14:48:08.614316940 CEST5633853192.168.2.38.8.8.8
                          Aug 3, 2021 14:48:08.663347006 CEST53563388.8.8.8192.168.2.3
                          Aug 3, 2021 14:48:09.474360943 CEST5212353192.168.2.337.235.1.177
                          Aug 3, 2021 14:48:11.270565033 CEST5942053192.168.2.38.8.8.8
                          Aug 3, 2021 14:48:11.306169033 CEST53594208.8.8.8192.168.2.3
                          Aug 3, 2021 14:48:14.224886894 CEST5878453192.168.2.38.8.8.8
                          Aug 3, 2021 14:48:14.257884979 CEST53587848.8.8.8192.168.2.3
                          Aug 3, 2021 14:48:14.458291054 CEST6397853192.168.2.38.8.8.8
                          Aug 3, 2021 14:48:14.491636992 CEST53639788.8.8.8192.168.2.3
                          Aug 3, 2021 14:48:15.373739004 CEST6293853192.168.2.38.8.8.8
                          Aug 3, 2021 14:48:15.406469107 CEST53629388.8.8.8192.168.2.3
                          Aug 3, 2021 14:48:15.856225967 CEST5570853192.168.2.38.8.8.8
                          Aug 3, 2021 14:48:15.891494036 CEST53557088.8.8.8192.168.2.3
                          Aug 3, 2021 14:48:16.495096922 CEST5680353192.168.2.38.8.8.8
                          Aug 3, 2021 14:48:16.527456999 CEST53568038.8.8.8192.168.2.3
                          Aug 3, 2021 14:48:17.511301994 CEST5714553192.168.2.38.8.8.8
                          Aug 3, 2021 14:48:17.544800043 CEST53571458.8.8.8192.168.2.3
                          Aug 3, 2021 14:48:18.366750002 CEST5535953192.168.2.38.8.8.8
                          Aug 3, 2021 14:48:18.400470972 CEST53553598.8.8.8192.168.2.3
                          Aug 3, 2021 14:48:18.903029919 CEST5830653192.168.2.38.8.8.8
                          Aug 3, 2021 14:48:18.935570002 CEST53583068.8.8.8192.168.2.3
                          Aug 3, 2021 14:48:19.730734110 CEST6412453192.168.2.337.235.1.174
                          Aug 3, 2021 14:48:20.757323027 CEST6412453192.168.2.337.235.1.174
                          Aug 3, 2021 14:48:21.775692940 CEST6412453192.168.2.337.235.1.174
                          Aug 3, 2021 14:48:23.807049036 CEST6412453192.168.2.337.235.1.174
                          Aug 3, 2021 14:48:27.854806900 CEST6412453192.168.2.337.235.1.174
                          Aug 3, 2021 14:48:37.091653109 CEST4936153192.168.2.337.235.1.177
                          Aug 3, 2021 14:48:38.058000088 CEST4936153192.168.2.337.235.1.177
                          Aug 3, 2021 14:48:39.152194023 CEST4936153192.168.2.337.235.1.177
                          Aug 3, 2021 14:48:42.464492083 CEST4936153192.168.2.337.235.1.177
                          Aug 3, 2021 14:48:47.944371939 CEST4936153192.168.2.337.235.1.177
                          Aug 3, 2021 14:48:59.233321905 CEST6315053192.168.2.38.8.8.8
                          Aug 3, 2021 14:48:59.267369032 CEST53631508.8.8.8192.168.2.3
                          Aug 3, 2021 14:49:20.258800983 CEST5327953192.168.2.337.235.1.174
                          Aug 3, 2021 14:49:20.493740082 CEST5688153192.168.2.38.8.8.8
                          Aug 3, 2021 14:49:20.526868105 CEST53568818.8.8.8192.168.2.3
                          Aug 3, 2021 14:49:21.071223021 CEST5364253192.168.2.38.8.8.8
                          Aug 3, 2021 14:49:21.136039019 CEST53536428.8.8.8192.168.2.3
                          Aug 3, 2021 14:49:21.249716043 CEST5327953192.168.2.337.235.1.174
                          Aug 3, 2021 14:49:22.332037926 CEST5327953192.168.2.337.235.1.174
                          Aug 3, 2021 14:49:24.343555927 CEST5327953192.168.2.337.235.1.174
                          Aug 3, 2021 14:49:26.367660046 CEST5566753192.168.2.38.8.8.8
                          Aug 3, 2021 14:49:26.403091908 CEST53556678.8.8.8192.168.2.3
                          Aug 3, 2021 14:49:27.067500114 CEST5483353192.168.2.38.8.8.8
                          Aug 3, 2021 14:49:27.103094101 CEST53548338.8.8.8192.168.2.3
                          Aug 3, 2021 14:49:28.393822908 CEST5327953192.168.2.337.235.1.174
                          Aug 3, 2021 14:49:32.611684084 CEST6247653192.168.2.337.235.1.177
                          Aug 3, 2021 14:49:33.625143051 CEST6247653192.168.2.337.235.1.177
                          Aug 3, 2021 14:49:34.676656008 CEST6247653192.168.2.337.235.1.177
                          Aug 3, 2021 14:49:36.722357988 CEST6247653192.168.2.337.235.1.177
                          Aug 3, 2021 14:49:40.736180067 CEST6247653192.168.2.337.235.1.177
                          Aug 3, 2021 14:49:44.786421061 CEST4970553192.168.2.38.8.8.8
                          Aug 3, 2021 14:49:44.821619034 CEST53497058.8.8.8192.168.2.3
                          Aug 3, 2021 14:49:50.041579962 CEST6147753192.168.2.337.235.1.174
                          Aug 3, 2021 14:49:51.064291000 CEST6147753192.168.2.337.235.1.174
                          Aug 3, 2021 14:49:52.095896006 CEST6147753192.168.2.337.235.1.174
                          Aug 3, 2021 14:49:54.142237902 CEST6147753192.168.2.337.235.1.174
                          Aug 3, 2021 14:49:56.636926889 CEST6163353192.168.2.38.8.8.8
                          Aug 3, 2021 14:49:56.672193050 CEST53616338.8.8.8192.168.2.3
                          Aug 3, 2021 14:49:57.021744967 CEST5594953192.168.2.38.8.8.8
                          Aug 3, 2021 14:49:57.048093081 CEST53559498.8.8.8192.168.2.3
                          Aug 3, 2021 14:49:57.896776915 CEST5760153192.168.2.38.8.8.8
                          Aug 3, 2021 14:49:57.924571037 CEST53576018.8.8.8192.168.2.3
                          Aug 3, 2021 14:49:58.158940077 CEST6147753192.168.2.337.235.1.174
                          Aug 3, 2021 14:49:58.259133101 CEST4934253192.168.2.38.8.8.8
                          Aug 3, 2021 14:49:58.300903082 CEST53493428.8.8.8192.168.2.3
                          Aug 3, 2021 14:49:58.524367094 CEST5625353192.168.2.38.8.8.8
                          Aug 3, 2021 14:49:58.552354097 CEST53562538.8.8.8192.168.2.3
                          Aug 3, 2021 14:50:02.238451004 CEST4966753192.168.2.337.235.1.177
                          Aug 3, 2021 14:50:03.310316086 CEST4966753192.168.2.337.235.1.177
                          Aug 3, 2021 14:50:04.346719027 CEST4966753192.168.2.337.235.1.177
                          Aug 3, 2021 14:50:07.050962925 CEST4966753192.168.2.337.235.1.177
                          Aug 3, 2021 14:50:11.049787998 CEST4966753192.168.2.337.235.1.177
                          Aug 3, 2021 14:50:15.121032953 CEST5543953192.168.2.38.8.8.8
                          Aug 3, 2021 14:50:15.156367064 CEST53554398.8.8.8192.168.2.3
                          Aug 3, 2021 14:50:20.361833096 CEST5706953192.168.2.337.235.1.174
                          Aug 3, 2021 14:50:21.348215103 CEST5706953192.168.2.337.235.1.174
                          Aug 3, 2021 14:50:22.395008087 CEST5706953192.168.2.337.235.1.174
                          Aug 3, 2021 14:50:24.441831112 CEST5706953192.168.2.337.235.1.174
                          Aug 3, 2021 14:50:24.716253042 CEST534966737.235.1.177192.168.2.3
                          Aug 3, 2021 14:50:28.489753962 CEST5706953192.168.2.337.235.1.174
                          Aug 3, 2021 14:50:32.527599096 CEST5765953192.168.2.337.235.1.177
                          Aug 3, 2021 14:50:33.551763058 CEST5765953192.168.2.337.235.1.177
                          Aug 3, 2021 14:50:34.567779064 CEST5765953192.168.2.337.235.1.177
                          Aug 3, 2021 14:50:36.599262953 CEST5765953192.168.2.337.235.1.177
                          Aug 3, 2021 14:50:41.068483114 CEST5765953192.168.2.337.235.1.177
                          Aug 3, 2021 14:50:45.186182022 CEST5471753192.168.2.38.8.8.8
                          Aug 3, 2021 14:50:45.220398903 CEST53547178.8.8.8192.168.2.3
                          Aug 3, 2021 14:51:05.606369019 CEST6397553192.168.2.337.235.1.174
                          Aug 3, 2021 14:51:06.648612022 CEST6397553192.168.2.337.235.1.174
                          Aug 3, 2021 14:51:07.649360895 CEST6397553192.168.2.337.235.1.174
                          Aug 3, 2021 14:51:09.664884090 CEST6397553192.168.2.337.235.1.174
                          Aug 3, 2021 14:51:14.306473970 CEST6397553192.168.2.337.235.1.174
                          Aug 3, 2021 14:51:18.394648075 CEST5663953192.168.2.337.235.1.177
                          Aug 3, 2021 14:51:19.399610043 CEST5663953192.168.2.337.235.1.177
                          Aug 3, 2021 14:51:20.399944067 CEST5663953192.168.2.337.235.1.177
                          Aug 3, 2021 14:51:22.415865898 CEST5663953192.168.2.337.235.1.177
                          Aug 3, 2021 14:51:26.447141886 CEST5663953192.168.2.337.235.1.177
                          Aug 3, 2021 14:51:30.542591095 CEST5185653192.168.2.38.8.8.8
                          Aug 3, 2021 14:51:30.574955940 CEST53518568.8.8.8192.168.2.3
                          Aug 3, 2021 14:51:35.773979902 CEST5654653192.168.2.337.235.1.174
                          Aug 3, 2021 14:51:36.807101965 CEST5654653192.168.2.337.235.1.174
                          Aug 3, 2021 14:51:37.808396101 CEST5654653192.168.2.337.235.1.174
                          Aug 3, 2021 14:51:39.807629108 CEST5654653192.168.2.337.235.1.174
                          Aug 3, 2021 14:51:43.854691982 CEST5654653192.168.2.337.235.1.174
                          Aug 3, 2021 14:51:47.896253109 CEST6215253192.168.2.337.235.1.177
                          Aug 3, 2021 14:51:48.886442900 CEST6215253192.168.2.337.235.1.177
                          Aug 3, 2021 14:51:49.917701006 CEST6215253192.168.2.337.235.1.177
                          Aug 3, 2021 14:51:51.965085983 CEST6215253192.168.2.337.235.1.177
                          Aug 3, 2021 14:51:55.998029947 CEST6215253192.168.2.337.235.1.177
                          Aug 3, 2021 14:52:00.522680044 CEST5347053192.168.2.38.8.8.8
                          Aug 3, 2021 14:52:00.558269024 CEST53534708.8.8.8192.168.2.3
                          Aug 3, 2021 14:52:06.244844913 CEST5644653192.168.2.337.235.1.174
                          Aug 3, 2021 14:52:07.232276917 CEST5644653192.168.2.337.235.1.174
                          Aug 3, 2021 14:52:08.251035929 CEST5644653192.168.2.337.235.1.174
                          Aug 3, 2021 14:52:10.247987032 CEST5644653192.168.2.337.235.1.174
                          Aug 3, 2021 14:52:14.295309067 CEST5644653192.168.2.337.235.1.174
                          Aug 3, 2021 14:52:18.359519005 CEST5963153192.168.2.337.235.1.177
                          Aug 3, 2021 14:52:19.404599905 CEST5963153192.168.2.337.235.1.177
                          Aug 3, 2021 14:52:20.420696020 CEST5963153192.168.2.337.235.1.177
                          Aug 3, 2021 14:52:22.467644930 CEST5963153192.168.2.337.235.1.177
                          Aug 3, 2021 14:52:26.341532946 CEST5551553192.168.2.38.8.8.8
                          Aug 3, 2021 14:52:26.374078989 CEST53555158.8.8.8192.168.2.3
                          Aug 3, 2021 14:52:26.468364000 CEST5963153192.168.2.337.235.1.177
                          Aug 3, 2021 14:52:30.553715944 CEST6454753192.168.2.38.8.8.8
                          Aug 3, 2021 14:52:30.590955973 CEST53645478.8.8.8192.168.2.3
                          Aug 3, 2021 14:52:50.889255047 CEST5175953192.168.2.337.235.1.174
                          Aug 3, 2021 14:52:51.907280922 CEST5175953192.168.2.337.235.1.174
                          Aug 3, 2021 14:52:52.907313108 CEST5175953192.168.2.337.235.1.174
                          Aug 3, 2021 14:52:54.923268080 CEST5175953192.168.2.337.235.1.174
                          Aug 3, 2021 14:52:58.847239971 CEST5920753192.168.2.38.8.8.8
                          Aug 3, 2021 14:52:58.884262085 CEST53592078.8.8.8192.168.2.3
                          Aug 3, 2021 14:52:58.954516888 CEST5175953192.168.2.337.235.1.174
                          Aug 3, 2021 14:52:59.260263920 CEST5426953192.168.2.38.8.8.8
                          Aug 3, 2021 14:52:59.307693958 CEST53542698.8.8.8192.168.2.3
                          Aug 3, 2021 14:53:03.039676905 CEST5485653192.168.2.337.235.1.177
                          Aug 3, 2021 14:53:04.064625978 CEST5485653192.168.2.337.235.1.177
                          Aug 3, 2021 14:53:05.097647905 CEST5485653192.168.2.337.235.1.177
                          Aug 3, 2021 14:53:07.111944914 CEST5485653192.168.2.337.235.1.177
                          Aug 3, 2021 14:53:11.128269911 CEST5485653192.168.2.337.235.1.177
                          Aug 3, 2021 14:53:15.209213972 CEST6414053192.168.2.38.8.8.8
                          Aug 3, 2021 14:53:15.244764090 CEST53641408.8.8.8192.168.2.3
                          Aug 3, 2021 14:53:20.518920898 CEST6227153192.168.2.337.235.1.174
                          Aug 3, 2021 14:53:21.519411087 CEST6227153192.168.2.337.235.1.174
                          Aug 3, 2021 14:53:22.566785097 CEST6227153192.168.2.337.235.1.174
                          Aug 3, 2021 14:53:24.597949028 CEST6227153192.168.2.337.235.1.174
                          Aug 3, 2021 14:53:28.645020008 CEST6227153192.168.2.337.235.1.174
                          Aug 3, 2021 14:53:32.718887091 CEST5740453192.168.2.337.235.1.177
                          Aug 3, 2021 14:53:33.754573107 CEST5740453192.168.2.337.235.1.177
                          Aug 3, 2021 14:53:34.754681110 CEST5740453192.168.2.337.235.1.177
                          Aug 3, 2021 14:53:36.770991087 CEST5740453192.168.2.337.235.1.177
                          Aug 3, 2021 14:53:40.786465883 CEST5740453192.168.2.337.235.1.177

                          ICMP Packets

                          TimestampSource IPDest IPChecksumCodeType
                          Aug 3, 2021 14:50:24.716542006 CEST192.168.2.337.235.1.177e78e(Port unreachable)Destination Unreachable

                          DNS Queries

                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                          Aug 3, 2021 14:46:59.369134903 CEST192.168.2.38.8.8.80xb6c2Standard query (0)onedrive.live.comA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:00.197516918 CEST192.168.2.38.8.8.80x1de6Standard query (0)vt8dlg.bn.files.1drv.comA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:04.296108007 CEST192.168.2.337.235.1.1740xbff2Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:05.292681932 CEST192.168.2.337.235.1.1740xbff2Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:06.242685080 CEST192.168.2.337.235.1.1740xbff2Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:08.242249966 CEST192.168.2.337.235.1.1740xbff2Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:12.354681015 CEST192.168.2.337.235.1.1740xbff2Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:16.907313108 CEST192.168.2.337.235.1.1770xf34Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:17.946968079 CEST192.168.2.337.235.1.1770xf34Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:18.976984024 CEST192.168.2.337.235.1.1770xf34Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:21.649106979 CEST192.168.2.337.235.1.1770xf34Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:26.166146040 CEST192.168.2.337.235.1.1770xf34Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:35.621997118 CEST192.168.2.38.8.8.80x1edaStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:42.986458063 CEST192.168.2.337.235.1.1740xdd09Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:43.999631882 CEST192.168.2.337.235.1.1740xdd09Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:45.011310101 CEST192.168.2.337.235.1.1740xdd09Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:48.230129004 CEST192.168.2.337.235.1.1740xdd09Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:47:52.277863979 CEST192.168.2.337.235.1.1740xdd09Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:01.229027033 CEST192.168.2.337.235.1.1770x347eStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:02.343261957 CEST192.168.2.337.235.1.1770x347eStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:03.368522882 CEST192.168.2.337.235.1.1770x347eStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:05.399483919 CEST192.168.2.337.235.1.1770x347eStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:09.474360943 CEST192.168.2.337.235.1.1770x347eStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:14.224886894 CEST192.168.2.38.8.8.80x6b09Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:19.730734110 CEST192.168.2.337.235.1.1740xcffdStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:20.757323027 CEST192.168.2.337.235.1.1740xcffdStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:21.775692940 CEST192.168.2.337.235.1.1740xcffdStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:23.807049036 CEST192.168.2.337.235.1.1740xcffdStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:27.854806900 CEST192.168.2.337.235.1.1740xcffdStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:37.091653109 CEST192.168.2.337.235.1.1770x6604Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:38.058000088 CEST192.168.2.337.235.1.1770x6604Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:39.152194023 CEST192.168.2.337.235.1.1770x6604Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:42.464492083 CEST192.168.2.337.235.1.1770x6604Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:47.944371939 CEST192.168.2.337.235.1.1770x6604Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:59.233321905 CEST192.168.2.38.8.8.80x5594Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:20.258800983 CEST192.168.2.337.235.1.1740xdcf7Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:20.493740082 CEST192.168.2.38.8.8.80xf4faStandard query (0)onedrive.live.comA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:21.071223021 CEST192.168.2.38.8.8.80x9cf0Standard query (0)vt8dlg.bn.files.1drv.comA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:21.249716043 CEST192.168.2.337.235.1.1740xdcf7Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:22.332037926 CEST192.168.2.337.235.1.1740xdcf7Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:24.343555927 CEST192.168.2.337.235.1.1740xdcf7Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:26.367660046 CEST192.168.2.38.8.8.80xc35eStandard query (0)onedrive.live.comA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:27.067500114 CEST192.168.2.38.8.8.80xaab6Standard query (0)vt8dlg.bn.files.1drv.comA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:28.393822908 CEST192.168.2.337.235.1.1740xdcf7Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:32.611684084 CEST192.168.2.337.235.1.1770xb62fStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:33.625143051 CEST192.168.2.337.235.1.1770xb62fStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:34.676656008 CEST192.168.2.337.235.1.1770xb62fStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:36.722357988 CEST192.168.2.337.235.1.1770xb62fStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:40.736180067 CEST192.168.2.337.235.1.1770xb62fStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:44.786421061 CEST192.168.2.38.8.8.80x582eStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:50.041579962 CEST192.168.2.337.235.1.1740xcab9Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:51.064291000 CEST192.168.2.337.235.1.1740xcab9Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:52.095896006 CEST192.168.2.337.235.1.1740xcab9Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:54.142237902 CEST192.168.2.337.235.1.1740xcab9Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:58.158940077 CEST192.168.2.337.235.1.1740xcab9Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:02.238451004 CEST192.168.2.337.235.1.1770xe0edStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:03.310316086 CEST192.168.2.337.235.1.1770xe0edStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:04.346719027 CEST192.168.2.337.235.1.1770xe0edStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:07.050962925 CEST192.168.2.337.235.1.1770xe0edStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:11.049787998 CEST192.168.2.337.235.1.1770xe0edStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:15.121032953 CEST192.168.2.38.8.8.80xf0baStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:20.361833096 CEST192.168.2.337.235.1.1740x1a01Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:21.348215103 CEST192.168.2.337.235.1.1740x1a01Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:22.395008087 CEST192.168.2.337.235.1.1740x1a01Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:24.441831112 CEST192.168.2.337.235.1.1740x1a01Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:28.489753962 CEST192.168.2.337.235.1.1740x1a01Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:32.527599096 CEST192.168.2.337.235.1.1770xe7d4Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:33.551763058 CEST192.168.2.337.235.1.1770xe7d4Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:34.567779064 CEST192.168.2.337.235.1.1770xe7d4Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:36.599262953 CEST192.168.2.337.235.1.1770xe7d4Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:41.068483114 CEST192.168.2.337.235.1.1770xe7d4Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:45.186182022 CEST192.168.2.38.8.8.80xa59bStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:05.606369019 CEST192.168.2.337.235.1.1740x1573Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:06.648612022 CEST192.168.2.337.235.1.1740x1573Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:07.649360895 CEST192.168.2.337.235.1.1740x1573Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:09.664884090 CEST192.168.2.337.235.1.1740x1573Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:14.306473970 CEST192.168.2.337.235.1.1740x1573Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:18.394648075 CEST192.168.2.337.235.1.1770xb62bStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:19.399610043 CEST192.168.2.337.235.1.1770xb62bStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:20.399944067 CEST192.168.2.337.235.1.1770xb62bStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:22.415865898 CEST192.168.2.337.235.1.1770xb62bStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:26.447141886 CEST192.168.2.337.235.1.1770xb62bStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:30.542591095 CEST192.168.2.38.8.8.80x8660Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:35.773979902 CEST192.168.2.337.235.1.1740xa2f0Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:36.807101965 CEST192.168.2.337.235.1.1740xa2f0Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:37.808396101 CEST192.168.2.337.235.1.1740xa2f0Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:39.807629108 CEST192.168.2.337.235.1.1740xa2f0Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:43.854691982 CEST192.168.2.337.235.1.1740xa2f0Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:47.896253109 CEST192.168.2.337.235.1.1770x486fStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:48.886442900 CEST192.168.2.337.235.1.1770x486fStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:49.917701006 CEST192.168.2.337.235.1.1770x486fStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:51.965085983 CEST192.168.2.337.235.1.1770x486fStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:55.998029947 CEST192.168.2.337.235.1.1770x486fStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:00.522680044 CEST192.168.2.38.8.8.80x1d1Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:06.244844913 CEST192.168.2.337.235.1.1740x69f0Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:07.232276917 CEST192.168.2.337.235.1.1740x69f0Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:08.251035929 CEST192.168.2.337.235.1.1740x69f0Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:10.247987032 CEST192.168.2.337.235.1.1740x69f0Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:14.295309067 CEST192.168.2.337.235.1.1740x69f0Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:18.359519005 CEST192.168.2.337.235.1.1770xae39Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:19.404599905 CEST192.168.2.337.235.1.1770xae39Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:20.420696020 CEST192.168.2.337.235.1.1770xae39Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:22.467644930 CEST192.168.2.337.235.1.1770xae39Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:26.468364000 CEST192.168.2.337.235.1.1770xae39Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:30.553715944 CEST192.168.2.38.8.8.80x169Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:50.889255047 CEST192.168.2.337.235.1.1740xc6f4Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:51.907280922 CEST192.168.2.337.235.1.1740xc6f4Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:52.907313108 CEST192.168.2.337.235.1.1740xc6f4Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:54.923268080 CEST192.168.2.337.235.1.1740xc6f4Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:58.954516888 CEST192.168.2.337.235.1.1740xc6f4Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:03.039676905 CEST192.168.2.337.235.1.1770xeef9Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:04.064625978 CEST192.168.2.337.235.1.1770xeef9Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:05.097647905 CEST192.168.2.337.235.1.1770xeef9Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:07.111944914 CEST192.168.2.337.235.1.1770xeef9Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:11.128269911 CEST192.168.2.337.235.1.1770xeef9Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:15.209213972 CEST192.168.2.38.8.8.80xf3cbStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:20.518920898 CEST192.168.2.337.235.1.1740xb4aStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:21.519411087 CEST192.168.2.337.235.1.1740xb4aStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:22.566785097 CEST192.168.2.337.235.1.1740xb4aStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:24.597949028 CEST192.168.2.337.235.1.1740xb4aStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:28.645020008 CEST192.168.2.337.235.1.1740xb4aStandard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:32.718887091 CEST192.168.2.337.235.1.1770xb966Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:33.754573107 CEST192.168.2.337.235.1.1770xb966Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:34.754681110 CEST192.168.2.337.235.1.1770xb966Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:36.770991087 CEST192.168.2.337.235.1.1770xb966Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:40.786465883 CEST192.168.2.337.235.1.1770xb966Standard query (0)mexi11.ddns.netA (IP address)IN (0x0001)

                          DNS Answers

                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                          Aug 3, 2021 14:46:59.405335903 CEST8.8.8.8192.168.2.30xb6c2No error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                          Aug 3, 2021 14:47:00.252003908 CEST8.8.8.8192.168.2.30x1de6No error (0)vt8dlg.bn.files.1drv.combn-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                          Aug 3, 2021 14:47:00.252003908 CEST8.8.8.8192.168.2.30x1de6No error (0)bn-files.fe.1drv.comodc-bn-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                          Aug 3, 2021 14:47:35.656497002 CEST8.8.8.8192.168.2.30x1edaNo error (0)mexi11.ddns.net194.5.98.74A (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:14.257884979 CEST8.8.8.8192.168.2.30x6b09No error (0)mexi11.ddns.net194.5.98.74A (IP address)IN (0x0001)
                          Aug 3, 2021 14:48:59.267369032 CEST8.8.8.8192.168.2.30x5594No error (0)mexi11.ddns.net194.5.98.74A (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:20.526868105 CEST8.8.8.8192.168.2.30xf4faNo error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                          Aug 3, 2021 14:49:21.136039019 CEST8.8.8.8192.168.2.30x9cf0No error (0)vt8dlg.bn.files.1drv.combn-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                          Aug 3, 2021 14:49:21.136039019 CEST8.8.8.8192.168.2.30x9cf0No error (0)bn-files.fe.1drv.comodc-bn-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                          Aug 3, 2021 14:49:26.403091908 CEST8.8.8.8192.168.2.30xc35eNo error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                          Aug 3, 2021 14:49:27.103094101 CEST8.8.8.8192.168.2.30xaab6No error (0)vt8dlg.bn.files.1drv.combn-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                          Aug 3, 2021 14:49:27.103094101 CEST8.8.8.8192.168.2.30xaab6No error (0)bn-files.fe.1drv.comodc-bn-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                          Aug 3, 2021 14:49:44.821619034 CEST8.8.8.8192.168.2.30x582eNo error (0)mexi11.ddns.net194.5.98.74A (IP address)IN (0x0001)
                          Aug 3, 2021 14:49:56.672193050 CEST8.8.8.8192.168.2.30xcd5bNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                          Aug 3, 2021 14:50:15.156367064 CEST8.8.8.8192.168.2.30xf0baNo error (0)mexi11.ddns.net194.5.98.74A (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:24.716253042 CEST37.235.1.177192.168.2.30xe0edNo error (0)mexi11.ddns.net194.5.98.74A (IP address)IN (0x0001)
                          Aug 3, 2021 14:50:45.220398903 CEST8.8.8.8192.168.2.30xa59bNo error (0)mexi11.ddns.net194.5.98.74A (IP address)IN (0x0001)
                          Aug 3, 2021 14:51:30.574955940 CEST8.8.8.8192.168.2.30x8660No error (0)mexi11.ddns.net194.5.98.74A (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:00.558269024 CEST8.8.8.8192.168.2.30x1d1No error (0)mexi11.ddns.net194.5.98.74A (IP address)IN (0x0001)
                          Aug 3, 2021 14:52:30.590955973 CEST8.8.8.8192.168.2.30x169No error (0)mexi11.ddns.net194.5.98.74A (IP address)IN (0x0001)
                          Aug 3, 2021 14:53:15.244764090 CEST8.8.8.8192.168.2.30xf3cbNo error (0)mexi11.ddns.net194.5.98.74A (IP address)IN (0x0001)

                          Code Manipulations

                          Statistics

                          Behavior

                          Click to jump to process

                          System Behavior

                          General

                          Start time:14:45:09
                          Start date:03/08/2021
                          Path:C:\Users\user\Desktop\7keerHhHvn.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Users\user\Desktop\7keerHhHvn.exe'
                          Imagebase:0x400000
                          File size:143360 bytes
                          MD5 hash:782783574D2D4B67666B77B686C2E673
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:Visual Basic
                          Reputation:low

                          General

                          Start time:14:46:05
                          Start date:03/08/2021
                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Users\user\Desktop\7keerHhHvn.exe'
                          Imagebase:0xd50000
                          File size:53248 bytes
                          MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Reputation:high

                          General

                          Start time:14:46:05
                          Start date:03/08/2021
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6b2800000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          General

                          Start time:14:47:08
                          Start date:03/08/2021
                          Path:C:\Users\user\subfolder1\filename1.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Users\user\subfolder1\filename1.exe'
                          Imagebase:0x400000
                          File size:143360 bytes
                          MD5 hash:782783574D2D4B67666B77B686C2E673
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:Visual Basic
                          Antivirus matches:
                          • Detection: 100%, Joe Sandbox ML
                          • Detection: 31%, ReversingLabs
                          Reputation:low

                          General

                          Start time:14:47:16
                          Start date:03/08/2021
                          Path:C:\Users\user\subfolder1\filename1.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Users\user\subfolder1\filename1.exe'
                          Imagebase:0x400000
                          File size:143360 bytes
                          MD5 hash:782783574D2D4B67666B77B686C2E673
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:Visual Basic
                          Reputation:low

                          General

                          Start time:14:48:18
                          Start date:03/08/2021
                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                          Wow64 process (32bit):false
                          Commandline:'C:\Users\user\subfolder1\filename1.exe'
                          Imagebase:0xd0000
                          File size:53248 bytes
                          MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          General

                          Start time:14:48:18
                          Start date:03/08/2021
                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                          Wow64 process (32bit):false
                          Commandline:'C:\Users\user\subfolder1\filename1.exe'
                          Imagebase:0x130000
                          File size:53248 bytes
                          MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          General

                          Start time:14:48:19
                          Start date:03/08/2021
                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Users\user\subfolder1\filename1.exe'
                          Imagebase:0xea0000
                          File size:53248 bytes
                          MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000026.00000002.767234010.000000001F1D1000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000026.00000002.767234010.000000001F1D1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000026.00000002.767134795.000000001E1D1000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000026.00000002.767134795.000000001E1D1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000026.00000002.762525078.0000000000FD0000.00000004.00000001.sdmp, Author: Joe Security
                          Reputation:high

                          General

                          Start time:14:48:19
                          Start date:03/08/2021
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6b2800000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          General

                          Start time:14:48:25
                          Start date:03/08/2021
                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                          Wow64 process (32bit):false
                          Commandline:'C:\Users\user\subfolder1\filename1.exe'
                          Imagebase:0x520000
                          File size:53248 bytes
                          MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          General

                          Start time:14:48:25
                          Start date:03/08/2021
                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Users\user\subfolder1\filename1.exe'
                          Imagebase:0x8c0000
                          File size:53248 bytes
                          MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000029.00000002.780177556.000000001EBB1000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000029.00000002.780177556.000000001EBB1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000029.00000002.780062745.000000001DBB1000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000029.00000002.780062745.000000001DBB1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000029.00000002.774677046.00000000009F0000.00000004.00000001.sdmp, Author: Joe Security

                          General

                          Start time:14:48:26
                          Start date:03/08/2021
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6b2800000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Disassembly

                          Code Analysis

                          Reset < >