Loading ...

Play interactive tourEdit tour

Windows Analysis Report Dgc1mwB234

Overview

General Information

Sample Name:Dgc1mwB234 (renamed file extension from none to exe)
Analysis ID:508639
MD5:5dc1d41e2f9969d85896921f7b4ae261
SHA1:8dae6eb305ead57eeddfdecbf34cca61af653973
SHA256:2a95fede08d035e26d8a261c58359901344d23395094bd51f32e868964d61634
Tags:32exeNanoCoretrojan
Infos:

Most interesting Screenshot:

Detection

NanoCore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Antivirus detection for URL or domain
Yara detected Nanocore RAT
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • Dgc1mwB234.exe (PID: 6408 cmdline: 'C:\Users\user\Desktop\Dgc1mwB234.exe' MD5: 5DC1D41E2F9969D85896921F7B4AE261)
    • schtasks.exe (PID: 6688 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CXFxEHIAOoJFws' /XML 'C:\Users\user\AppData\Local\Temp\tmpC9C9.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 6720 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe MD5: 71369277D09DA0830C8C59F9E22BB23A)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "dcf3fee6-c103-45ee-a2f0-f8afaa78", "Group": "A New TIme Has Come", "Domain1": "newme122.3utilities.com", "Domain2": "newme1122.3utilities.com", "Port": 8822, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.253245800.0000000002801000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000000.00000002.253904015.0000000003801000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xfe305:$x1: NanoCore.ClientPluginHost
    • 0xfe342:$x2: IClientNetworkHost
    • 0x101e75:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000000.00000002.253904015.0000000003801000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000000.00000002.253904015.0000000003801000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfe06d:$a: NanoCore
      • 0xfe07d:$a: NanoCore
      • 0xfe2b1:$a: NanoCore
      • 0xfe2c5:$a: NanoCore
      • 0xfe305:$a: NanoCore
      • 0xfe0cc:$b: ClientPlugin
      • 0xfe2ce:$b: ClientPlugin
      • 0xfe30e:$b: ClientPlugin
      • 0xfe1f3:$c: ProjectData
      • 0xfebfa:$d: DESCrypto
      • 0x1065c6:$e: KeepAlive
      • 0x1045b4:$g: LogClientMessage
      • 0x1007af:$i: get_Connected
      • 0xb5b32:$j: #=q
      • 0xfef30:$j: #=q
      • 0xfef60:$j: #=q
      • 0xfef7c:$j: #=q
      • 0xfefac:$j: #=q
      • 0xfefc8:$j: #=q
      • 0xfefe4:$j: #=q
      • 0xff014:$j: #=q
      00000000.00000002.254807423.0000000003B0F000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1013d:$x1: NanoCore.ClientPluginHost
      • 0x1017a:$x2: IClientNetworkHost
      • 0x13cad:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 3 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      0.2.Dgc1mwB234.exe.38ef178.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0.2.Dgc1mwB234.exe.38ef178.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      0.2.Dgc1mwB234.exe.38ef178.2.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        0.2.Dgc1mwB234.exe.38ef178.2.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfef5:$a: NanoCore
        • 0xff05:$a: NanoCore
        • 0x10139:$a: NanoCore
        • 0x1014d:$a: NanoCore
        • 0x1018d:$a: NanoCore
        • 0xff54:$b: ClientPlugin
        • 0x10156:$b: ClientPlugin
        • 0x10196:$b: ClientPlugin
        • 0x1007b:$c: ProjectData
        • 0x10a82:$d: DESCrypto
        • 0x1844e:$e: KeepAlive
        • 0x1643c:$g: LogClientMessage
        • 0x12637:$i: get_Connected
        • 0x10db8:$j: #=q
        • 0x10de8:$j: #=q
        • 0x10e04:$j: #=q
        • 0x10e34:$j: #=q
        • 0x10e50:$j: #=q
        • 0x10e6c:$j: #=q
        • 0x10e9c:$j: #=q
        • 0x10eb8:$j: #=q
        0.2.Dgc1mwB234.exe.2807aac.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Click to see the 4 entries

          Sigma Overview

          AV Detection:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 6720, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          E-Banking Fraud:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 6720, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          System Summary:

          barindex
          Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper ArgumentsShow sources
          Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth, Christian Burkard: Data: Command: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ParentCommandLine: 'C:\Users\user\Desktop\Dgc1mwB234.exe' , ParentImage: C:\Users\user\Desktop\Dgc1mwB234.exe, ParentProcessId: 6408, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 6720
          Sigma detected: Possible Applocker BypassShow sources
          Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ParentCommandLine: 'C:\Users\user\Desktop\Dgc1mwB234.exe' , ParentImage: C:\Users\user\Desktop\Dgc1mwB234.exe, ParentProcessId: 6408, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 6720

          Stealing of Sensitive Information:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 6720, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Remote Access Functionality:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 6720, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 0.2.Dgc1mwB234.exe.38ef178.2.raw.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "dcf3fee6-c103-45ee-a2f0-f8afaa78", "Group": "A New TIme Has Come", "Domain1": "newme122.3utilities.com", "Domain2": "newme1122.3utilities.com", "Port": 8822, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
          Multi AV Scanner detection for submitted fileShow sources
          Source: Dgc1mwB234.exeVirustotal: Detection: 53%Perma Link
          Antivirus detection for URL or domainShow sources
          Source: newme122.3utilities.comAvira URL Cloud: Label: phishing
          Source: newme1122.3utilities.comAvira URL Cloud: Label: phishing
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0.2.Dgc1mwB234.exe.38ef178.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Dgc1mwB234.exe.38ef178.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.253904015.0000000003801000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.254807423.0000000003B0F000.00000004.00000001.sdmp, type: MEMORY
          Machine Learning detection for sampleShow sources
          Source: Dgc1mwB234.exeJoe Sandbox ML: detected
          Machine Learning detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Roaming\CXFxEHIAOoJFws.exeJoe Sandbox ML: detected
          Source: Dgc1mwB234.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
          Source: Dgc1mwB234.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: newme1122.3utilities.com
          Source: Malware configuration extractorURLs: newme122.3utilities.com
          Source: Joe Sandbox ViewASN Name: LEASEWEB-USA-NYC-11US LEASEWEB-USA-NYC-11US
          Source: Joe Sandbox ViewIP Address: 23.105.131.228 23.105.131.228
          Source: global trafficTCP traffic: 192.168.2.5:49778 -> 23.105.131.228:8822
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: Dgc1mwB234.exe, 00000000.00000002.253245800.0000000002801000.00000004.00000001.sdmpString found in binary or memory: http://www.collada.org/2005/11/COLLADASchema9Done
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: Dgc1mwB234.exe, 00000000.00000003.239894261.0000000004BE9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: Dgc1mwB234.exe, 00000000.00000003.240273446.0000000004BED000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersZ
          Source: Dgc1mwB234.exe, 00000000.00000003.252140639.0000000004BE0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comk
          Source: Dgc1mwB234.exe, 00000000.00000003.252140639.0000000004BE0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comlde
          Source: Dgc1mwB234.exe, 00000000.00000003.235069123.0000000004BFB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: Dgc1mwB234.exe, 00000000.00000003.235043877.0000000004BFB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com-u
          Source: Dgc1mwB234.exe, 00000000.00000003.235103191.0000000004BFB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comc
          Source: Dgc1mwB234.exe, 00000000.00000003.236789899.0000000004BE4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: Dgc1mwB234.exe, 00000000.00000003.236789899.0000000004BE4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn#
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: Dgc1mwB234.exe, 00000000.00000003.236772569.0000000004C1D000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn7
          Source: Dgc1mwB234.exe, 00000000.00000003.236853218.0000000004C1D000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnN
          Source: Dgc1mwB234.exe, 00000000.00000003.236789899.0000000004BE4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnate
          Source: Dgc1mwB234.exe, 00000000.00000003.236772569.0000000004C1D000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cng
          Source: Dgc1mwB234.exe, 00000000.00000003.236772569.0000000004C1D000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnl-g
          Source: Dgc1mwB234.exe, 00000000.00000003.236982143.0000000004BE4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnngH
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmp, Dgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: Dgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Negr
          Source: Dgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0-e
          Source: Dgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/b
          Source: Dgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
          Source: Dgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/k
          Source: Dgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/no
          Source: Dgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/p
          Source: Dgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/y
          Source: Dgc1mwB234.exe, 00000000.00000003.235043877.0000000004BFB000.00000004.00000001.sdmp, Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: Dgc1mwB234.exe, 00000000.00000003.235043877.0000000004BFB000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.combli
          Source: Dgc1mwB234.exe, 00000000.00000003.235094479.0000000004C04000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comblix5M
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: Dgc1mwB234.exe, 00000000.00000003.236089540.0000000004BE6000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krre
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: Dgc1mwB234.exe, 00000000.00000003.235298130.0000000004BFB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comcm
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: unknownDNS traffic detected: queries for: newme122.3utilities.com

          E-Banking Fraud:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0.2.Dgc1mwB234.exe.38ef178.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Dgc1mwB234.exe.38ef178.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.253904015.0000000003801000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.254807423.0000000003B0F000.00000004.00000001.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 0.2.Dgc1mwB234.exe.38ef178.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.Dgc1mwB234.exe.38ef178.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.Dgc1mwB234.exe.38ef178.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.Dgc1mwB234.exe.38ef178.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.253904015.0000000003801000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.253904015.0000000003801000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.254807423.0000000003B0F000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.254807423.0000000003B0F000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Dgc1mwB234.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: 0.2.Dgc1mwB234.exe.38ef178.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.Dgc1mwB234.exe.38ef178.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.Dgc1mwB234.exe.38ef178.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.Dgc1mwB234.exe.38ef178.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.Dgc1mwB234.exe.38ef178.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.Dgc1mwB234.exe.38ef178.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.253904015.0000000003801000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000000.00000002.253904015.0000000003801000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.254807423.0000000003B0F000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000000.00000002.254807423.0000000003B0F000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_023A2B20
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_023A387F
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_023A3890
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_0694087A NtQuerySystemInformation,
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_06940858 NtQuerySystemInformation,
          Source: Dgc1mwB234.exe, 00000000.00000002.253245800.0000000002801000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameTaskNode.dll4 vs Dgc1mwB234.exe
          Source: Dgc1mwB234.exe, 00000000.00000000.233591245.000000000021C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFormatt.exe8 vs Dgc1mwB234.exe
          Source: Dgc1mwB234.exeBinary or memory string: OriginalFilenameFormatt.exe8 vs Dgc1mwB234.exe
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\CXFxEHIAOoJFws.exe 2A95FEDE08D035E26D8A261C58359901344D23395094BD51F32E868964D61634
          Source: Dgc1mwB234.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: CXFxEHIAOoJFws.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: Dgc1mwB234.exeVirustotal: Detection: 53%
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeFile read: C:\Users\user\Desktop\Dgc1mwB234.exeJump to behavior
          Source: Dgc1mwB234.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\Dgc1mwB234.exe 'C:\Users\user\Desktop\Dgc1mwB234.exe'
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CXFxEHIAOoJFws' /XML 'C:\Users\user\AppData\Local\Temp\tmpC9C9.tmp'
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CXFxEHIAOoJFws' /XML 'C:\Users\user\AppData\Local\Temp\tmpC9C9.tmp'
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_0694063A AdjustTokenPrivileges,
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_06940603 AdjustTokenPrivileges,
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeFile created: C:\Users\user\AppData\Roaming\CXFxEHIAOoJFws.exeJump to behavior
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC9C9.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@6/5@49/2
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: Dgc1mwB234Joe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6712:120:WilError_01
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeMutant created: \Sessions\1\BaseNamedObjects\rmGtfB
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{dcf3fee6-c103-45ee-a2f0-f8afaa78d1fe}
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
          Source: Dgc1mwB234.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
          Source: Dgc1mwB234.exeStatic file information: File size 1085952 > 1048576
          Source: Dgc1mwB234.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: Dgc1mwB234.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x108800
          Source: Dgc1mwB234.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: Dgc1mwB234.exe, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.cs.Net Code: EOD88KdCEU System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: CXFxEHIAOoJFws.exe.0.dr, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.cs.Net Code: EOD88KdCEU System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.2.Dgc1mwB234.exe.110000.0.unpack, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.cs.Net Code: EOD88KdCEU System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.Dgc1mwB234.exe.110000.0.unpack, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.cs.Net Code: EOD88KdCEU System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_022B2C65 push es; ret
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_022B2864 push cs; ret
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_022B2894 push cs; ret
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_022B2FD9 pushfd ; ret
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_022C741E push ebp; ret
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_022C9D13 push ebp; retf
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_022C9D7E push ecx; retf
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_023A7626 push ebx; retf
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_023A760F push ebp; retf
          Source: initial sampleStatic PE information: section name: .text entropy: 7.90482158823
          Source: initial sampleStatic PE information: section name: .text entropy: 7.90482158823
          Source: Dgc1mwB234.exe, G7gig1XoOesu002ujr/QO0J29O1epEQ2KyoYx.csHigh entropy of concatenated method names: 'qoNk23KeHa', 'K66krexY1O', 'PDqknkOSUW', 'ghHkJiJagd', 'SgTku5stl3', 'fWmkgoN2U5', 'E5ykcn4I4M', 'c6QkOkDkJ9', 'MMukXI1GhJ', '.ctor'
          Source: Dgc1mwB234.exe, ystl3c6mum6VKbFWmo/piJagdp94nIKaI1agT.csHigh entropy of concatenated method names: 'ChT8tOVuYB', 'bJh8mxEW6L', 'kim8lWMFBF', 'dFx8IXLsLO', 'Xhv8RAx199', 'q9h8d1AK5g', 'zVm8vP59JH', '.ctor', 'GNxGoepZ5L', 'YAm8XVK8H4'
          Source: Dgc1mwB234.exe, w9AFeXCE2LplTLqrwa/wBlpvxnG1OO8NZvrh2.csHigh entropy of concatenated method names: 'G042ccYIU', 'jVoFPgyQK', 'gQLrWqZ91', 'WU9xXnGcp', 'xIgn6Rsnn', 'hwmCk16El', 'CoTJomARp', 'AS2brx4Hm', 'pLiuTiQbY', '.ctor'
          Source: Dgc1mwB234.exe, l7OxcvLstbIw8lvGdC/RvI4vZgoQLudakmusH.csHigh entropy of concatenated method names: 'wN0p2cDfr', 'T5C6PZrZb', '.ctor', 'nGiwowp1Z', 'V2j0HL0v4', 'clNsO0J29', 'TepYEQ2Ky', 'JYxos7gig', 'ToOQesu00', 'eujfrjHtv'
          Source: Dgc1mwB234.exe, wy1AdR1np9WlJVqIhu/Cie2rZaBGedqv9947T.csHigh entropy of concatenated method names: 'SlkGgsDX3i', 'bHpGLEUxQy', 'qnKGHPdynA', 'vmdGOEeoJ3', '.ctor', 'hwmGEk16El', 'KQXfyj2zJQ8MrBNeABL', 'pivo7TxOtTwwmcNRlOI', 'tY9QjbxHxcRGrnLGAu4', 'qfGsQdx20MZXaBbxQtj'
          Source: Dgc1mwB234.exe, CuDKkqb9fujhnZr9Ai/PP4n1TJr1Xh9QQ9GpY.csHigh entropy of concatenated method names: 'g1Xeh9QQ9', 'cpYtvuDKk', 'g9AiiDfDN', 'nkXlP1Ci2', '.ctor', 'qO8ONZvrh', 'ei9XAFeXE', 'eLpBlTLqr', 'AFZGYZCJd5', 'FaNAP4n1T'
          Source: Dgc1mwB234.exe, nNVJ9C3AKISUwBhf7F/LfDNLkuXP1Ci2OIbjn.csHigh entropy of concatenated method names: 'y4vRZoQLu', 'CakymusHu', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'dpJSAufGiedR27AlO7', 'GtT0wqXyUcb1q6aQBd', 'iCkukpzscUq8PAllws', 'zhZwPCHOL6OYbgQVFKI'
          Source: Dgc1mwB234.exe, PEJBXMArGEXXMibeB4/VHtvIHBBI0AWiAfhcJ.csHigh entropy of concatenated method names: 'jpjkwsAGDN', 'GMtk0q7LvC', 'OxhkYJucG6', 'bWpkork4Lf', '.ctor', 'l3IGQ1d0RG', 'ToString', 'pluk6S3m4W', 'hJPHskHI11plv4xyaJp', 'lvi45nHGRQeB9GSMfoH'
          Source: Dgc1mwB234.exe, sRpRS2Frx4HmHLiTiQ/Asnnnw2mk16ElvoTom.csHigh entropy of concatenated method names: 'AFZkZCJd5', 'QuYnbtNkBAIknWgOB4', 'Xe921B6KBuqrDhUc2i', 'AerSd7r5Mj1frUSoQ3', 'EUwFwIa9RhhA0y84vV', 'qnbJsWcestqFm4lt9c', 'uCSrdb7B9GDDPpnkO5'
          Source: Dgc1mwB234.exe, zsKCbvMEqdplulquC5/l83ecsIQRYPU9U2WDW.csHigh entropy of concatenated method names: 'I5K8uZpD7H', 'mF583XMeqW', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'roYdQD2h0yQjGEh2C9Q', 'RLjTxv28FEAwN9Gf6Kc', 'usXvsr2mPlZhnIfkwA9'
          Source: Dgc1mwB234.exe, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.csHigh entropy of concatenated method names: '.ctor', 'oIIkzTr2L0', 'QQ68qt0Juf', 'Dispose', 'xpn8kRlOqe', 'EOD88KdCEU', 'W6NjmbH3MRaI6VdAhj7', 'rmRrjoHpfMLwMSRCXnw', 'RtnZp7HeLQoraQN6lnO', 'F5RhEBHu37vqd1Olwjw'
          Source: CXFxEHIAOoJFws.exe.0.dr, G7gig1XoOesu002ujr/QO0J29O1epEQ2KyoYx.csHigh entropy of concatenated method names: 'qoNk23KeHa', 'K66krexY1O', 'PDqknkOSUW', 'ghHkJiJagd', 'SgTku5stl3', 'fWmkgoN2U5', 'E5ykcn4I4M', 'c6QkOkDkJ9', 'MMukXI1GhJ', '.ctor'
          Source: CXFxEHIAOoJFws.exe.0.dr, w9AFeXCE2LplTLqrwa/wBlpvxnG1OO8NZvrh2.csHigh entropy of concatenated method names: 'G042ccYIU', 'jVoFPgyQK', 'gQLrWqZ91', 'WU9xXnGcp', 'xIgn6Rsnn', 'hwmCk16El', 'CoTJomARp', 'AS2brx4Hm', 'pLiuTiQbY', '.ctor'
          Source: CXFxEHIAOoJFws.exe.0.dr, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.csHigh entropy of concatenated method names: '.ctor', 'oIIkzTr2L0', 'QQ68qt0Juf', 'Dispose', 'xpn8kRlOqe', 'EOD88KdCEU', 'W6NjmbH3MRaI6VdAhj7', 'rmRrjoHpfMLwMSRCXnw', 'RtnZp7HeLQoraQN6lnO', 'F5RhEBHu37vqd1Olwjw'
          Source: CXFxEHIAOoJFws.exe.0.dr, l7OxcvLstbIw8lvGdC/RvI4vZgoQLudakmusH.csHigh entropy of concatenated method names: 'wN0p2cDfr', 'T5C6PZrZb', '.ctor', 'nGiwowp1Z', 'V2j0HL0v4', 'clNsO0J29', 'TepYEQ2Ky', 'JYxos7gig', 'ToOQesu00', 'eujfrjHtv'
          Source: CXFxEHIAOoJFws.exe.0.dr, ystl3c6mum6VKbFWmo/piJagdp94nIKaI1agT.csHigh entropy of concatenated method names: 'ChT8tOVuYB', 'bJh8mxEW6L', 'kim8lWMFBF', 'dFx8IXLsLO', 'Xhv8RAx199', 'q9h8d1AK5g', 'zVm8vP59JH', '.ctor', 'GNxGoepZ5L', 'YAm8XVK8H4'
          Source: CXFxEHIAOoJFws.exe.0.dr, CuDKkqb9fujhnZr9Ai/PP4n1TJr1Xh9QQ9GpY.csHigh entropy of concatenated method names: 'g1Xeh9QQ9', 'cpYtvuDKk', 'g9AiiDfDN', 'nkXlP1Ci2', '.ctor', 'qO8ONZvrh', 'ei9XAFeXE', 'eLpBlTLqr', 'AFZGYZCJd5', 'FaNAP4n1T'
          Source: CXFxEHIAOoJFws.exe.0.dr, PEJBXMArGEXXMibeB4/VHtvIHBBI0AWiAfhcJ.csHigh entropy of concatenated method names: 'jpjkwsAGDN', 'GMtk0q7LvC', 'OxhkYJucG6', 'bWpkork4Lf', '.ctor', 'l3IGQ1d0RG', 'ToString', 'pluk6S3m4W', 'hJPHskHI11plv4xyaJp', 'lvi45nHGRQeB9GSMfoH'
          Source: CXFxEHIAOoJFws.exe.0.dr, nNVJ9C3AKISUwBhf7F/LfDNLkuXP1Ci2OIbjn.csHigh entropy of concatenated method names: 'y4vRZoQLu', 'CakymusHu', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'dpJSAufGiedR27AlO7', 'GtT0wqXyUcb1q6aQBd', 'iCkukpzscUq8PAllws', 'zhZwPCHOL6OYbgQVFKI'
          Source: CXFxEHIAOoJFws.exe.0.dr, sRpRS2Frx4HmHLiTiQ/Asnnnw2mk16ElvoTom.csHigh entropy of concatenated method names: 'AFZkZCJd5', 'QuYnbtNkBAIknWgOB4', 'Xe921B6KBuqrDhUc2i', 'AerSd7r5Mj1frUSoQ3', 'EUwFwIa9RhhA0y84vV', 'qnbJsWcestqFm4lt9c', 'uCSrdb7B9GDDPpnkO5'
          Source: CXFxEHIAOoJFws.exe.0.dr, zsKCbvMEqdplulquC5/l83ecsIQRYPU9U2WDW.csHigh entropy of concatenated method names: 'I5K8uZpD7H', 'mF583XMeqW', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'roYdQD2h0yQjGEh2C9Q', 'RLjTxv28FEAwN9Gf6Kc', 'usXvsr2mPlZhnIfkwA9'
          Source: CXFxEHIAOoJFws.exe.0.dr, wy1AdR1np9WlJVqIhu/Cie2rZaBGedqv9947T.csHigh entropy of concatenated method names: 'SlkGgsDX3i', 'bHpGLEUxQy', 'qnKGHPdynA', 'vmdGOEeoJ3', '.ctor', 'hwmGEk16El', 'KQXfyj2zJQ8MrBNeABL', 'pivo7TxOtTwwmcNRlOI', 'tY9QjbxHxcRGrnLGAu4', 'qfGsQdx20MZXaBbxQtj'
          Source: 0.2.Dgc1mwB234.exe.110000.0.unpack, w9AFeXCE2LplTLqrwa/wBlpvxnG1OO8NZvrh2.csHigh entropy of concatenated method names: 'G042ccYIU', 'jVoFPgyQK', 'gQLrWqZ91', 'WU9xXnGcp', 'xIgn6Rsnn', 'hwmCk16El', 'CoTJomARp', 'AS2brx4Hm', 'pLiuTiQbY', '.ctor'
          Source: 0.2.Dgc1mwB234.exe.110000.0.unpack, G7gig1XoOesu002ujr/QO0J29O1epEQ2KyoYx.csHigh entropy of concatenated method names: 'qoNk23KeHa', 'K66krexY1O', 'PDqknkOSUW', 'ghHkJiJagd', 'SgTku5stl3', 'fWmkgoN2U5', 'E5ykcn4I4M', 'c6QkOkDkJ9', 'MMukXI1GhJ', '.ctor'
          Source: 0.2.Dgc1mwB234.exe.110000.0.unpack, l7OxcvLstbIw8lvGdC/RvI4vZgoQLudakmusH.csHigh entropy of concatenated method names: 'wN0p2cDfr', 'T5C6PZrZb', '.ctor', 'nGiwowp1Z', 'V2j0HL0v4', 'clNsO0J29', 'TepYEQ2Ky', 'JYxos7gig', 'ToOQesu00', 'eujfrjHtv'
          Source: 0.2.Dgc1mwB234.exe.110000.0.unpack, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.csHigh entropy of concatenated method names: '.ctor', 'oIIkzTr2L0', 'QQ68qt0Juf', 'Dispose', 'xpn8kRlOqe', 'EOD88KdCEU', 'W6NjmbH3MRaI6VdAhj7', 'rmRrjoHpfMLwMSRCXnw', 'RtnZp7HeLQoraQN6lnO', 'F5RhEBHu37vqd1Olwjw'
          Source: 0.2.Dgc1mwB234.exe.110000.0.unpack, ystl3c6mum6VKbFWmo/piJagdp94nIKaI1agT.csHigh entropy of concatenated method names: 'ChT8tOVuYB', 'bJh8mxEW6L', 'kim8lWMFBF', 'dFx8IXLsLO', 'Xhv8RAx199', 'q9h8d1AK5g', 'zVm8vP59JH', '.ctor', 'GNxGoepZ5L', 'YAm8XVK8H4'
          Source: 0.2.Dgc1mwB234.exe.110000.0.unpack, CuDKkqb9fujhnZr9Ai/PP4n1TJr1Xh9QQ9GpY.csHigh entropy of concatenated method names: 'g1Xeh9QQ9', 'cpYtvuDKk', 'g9AiiDfDN', 'nkXlP1Ci2', '.ctor', 'qO8ONZvrh', 'ei9XAFeXE', 'eLpBlTLqr', 'AFZGYZCJd5', 'FaNAP4n1T'
          Source: 0.2.Dgc1mwB234.exe.110000.0.unpack, PEJBXMArGEXXMibeB4/VHtvIHBBI0AWiAfhcJ.csHigh entropy of concatenated method names: 'jpjkwsAGDN', 'GMtk0q7LvC', 'OxhkYJucG6', 'bWpkork4Lf', '.ctor', 'l3IGQ1d0RG', 'ToString', 'pluk6S3m4W', 'hJPHskHI11plv4xyaJp', 'lvi45nHGRQeB9GSMfoH'
          Source: 0.2.Dgc1mwB234.exe.110000.0.unpack, nNVJ9C3AKISUwBhf7F/LfDNLkuXP1Ci2OIbjn.csHigh entropy of concatenated method names: 'y4vRZoQLu', 'CakymusHu', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'dpJSAufGiedR27AlO7', 'GtT0wqXyUcb1q6aQBd', 'iCkukpzscUq8PAllws', 'zhZwPCHOL6OYbgQVFKI'
          Source: 0.2.Dgc1mwB234.exe.110000.0.unpack, sRpRS2Frx4HmHLiTiQ/Asnnnw2mk16ElvoTom.csHigh entropy of concatenated method names: 'AFZkZCJd5', 'QuYnbtNkBAIknWgOB4', 'Xe921B6KBuqrDhUc2i', 'AerSd7r5Mj1frUSoQ3', 'EUwFwIa9RhhA0y84vV', 'qnbJsWcestqFm4lt9c', 'uCSrdb7B9GDDPpnkO5'
          Source: 0.2.Dgc1mwB234.exe.110000.0.unpack, zsKCbvMEqdplulquC5/l83ecsIQRYPU9U2WDW.csHigh entropy of concatenated method names: 'I5K8uZpD7H', 'mF583XMeqW', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'roYdQD2h0yQjGEh2C9Q', 'RLjTxv28FEAwN9Gf6Kc', 'usXvsr2mPlZhnIfkwA9'
          Source: 0.2.Dgc1mwB234.exe.110000.0.unpack, wy1AdR1np9WlJVqIhu/Cie2rZaBGedqv9947T.csHigh entropy of concatenated method names: 'SlkGgsDX3i', 'bHpGLEUxQy', 'qnKGHPdynA', 'vmdGOEeoJ3', '.ctor', 'hwmGEk16El', 'KQXfyj2zJQ8MrBNeABL', 'pivo7TxOtTwwmcNRlOI', 'tY9QjbxHxcRGrnLGAu4', 'qfGsQdx20MZXaBbxQtj'
          Source: 0.0.Dgc1mwB234.exe.110000.0.unpack, G7gig1XoOesu002ujr/QO0J29O1epEQ2KyoYx.csHigh entropy of concatenated method names: 'qoNk23KeHa', 'K66krexY1O', 'PDqknkOSUW', 'ghHkJiJagd', 'SgTku5stl3', 'fWmkgoN2U5', 'E5ykcn4I4M', 'c6QkOkDkJ9', 'MMukXI1GhJ', '.ctor'
          Source: 0.0.Dgc1mwB234.exe.110000.0.unpack, w9AFeXCE2LplTLqrwa/wBlpvxnG1OO8NZvrh2.csHigh entropy of concatenated method names: 'G042ccYIU', 'jVoFPgyQK', 'gQLrWqZ91', 'WU9xXnGcp', 'xIgn6Rsnn', 'hwmCk16El', 'CoTJomARp', 'AS2brx4Hm', 'pLiuTiQbY', '.ctor'
          Source: 0.0.Dgc1mwB234.exe.110000.0.unpack, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.csHigh entropy of concatenated method names: '.ctor', 'oIIkzTr2L0', 'QQ68qt0Juf', 'Dispose', 'xpn8kRlOqe', 'EOD88KdCEU', 'W6NjmbH3MRaI6VdAhj7', 'rmRrjoHpfMLwMSRCXnw', 'RtnZp7HeLQoraQN6lnO', 'F5RhEBHu37vqd1Olwjw'
          Source: 0.0.Dgc1mwB234.exe.110000.0.unpack, l7OxcvLstbIw8lvGdC/RvI4vZgoQLudakmusH.csHigh entropy of concatenated method names: 'wN0p2cDfr', 'T5C6PZrZb', '.ctor', 'nGiwowp1Z', 'V2j0HL0v4', 'clNsO0J29', 'TepYEQ2Ky', 'JYxos7gig', 'ToOQesu00', 'eujfrjHtv'
          Source: 0.0.Dgc1mwB234.exe.110000.0.unpack, ystl3c6mum6VKbFWmo/piJagdp94nIKaI1agT.csHigh entropy of concatenated method names: 'ChT8tOVuYB', 'bJh8mxEW6L', 'kim8lWMFBF', 'dFx8IXLsLO', 'Xhv8RAx199', 'q9h8d1AK5g', 'zVm8vP59JH', '.ctor', 'GNxGoepZ5L', 'YAm8XVK8H4'
          Source: 0.0.Dgc1mwB234.exe.110000.0.unpack, nNVJ9C3AKISUwBhf7F/LfDNLkuXP1Ci2OIbjn.csHigh entropy of concatenated method names: 'y4vRZoQLu', 'CakymusHu', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'dpJSAufGiedR27AlO7', 'GtT0wqXyUcb1q6aQBd', 'iCkukpzscUq8PAllws', 'zhZwPCHOL6OYbgQVFKI'
          Source: 0.0.Dgc1mwB234.exe.110000.0.unpack, CuDKkqb9fujhnZr9Ai/PP4n1TJr1Xh9QQ9GpY.csHigh entropy of concatenated method names: 'g1Xeh9QQ9', 'cpYtvuDKk', 'g9AiiDfDN', 'nkXlP1Ci2', '.ctor', 'qO8ONZvrh', 'ei9XAFeXE', 'eLpBlTLqr', 'AFZGYZCJd5', 'FaNAP4n1T'
          Source: 0.0.Dgc1mwB234.exe.110000.0.unpack, PEJBXMArGEXXMibeB4/VHtvIHBBI0AWiAfhcJ.csHigh entropy of concatenated method names: 'jpjkwsAGDN', 'GMtk0q7LvC', 'OxhkYJucG6', 'bWpkork4Lf', '.ctor', 'l3IGQ1d0RG', 'ToString', 'pluk6S3m4W', 'hJPHskHI11plv4xyaJp', 'lvi45nHGRQeB9GSMfoH'
          Source: 0.0.Dgc1mwB234.exe.110000.0.unpack, sRpRS2Frx4HmHLiTiQ/Asnnnw2mk16ElvoTom.csHigh entropy of concatenated method names: 'AFZkZCJd5', 'QuYnbtNkBAIknWgOB4', 'Xe921B6KBuqrDhUc2i', 'AerSd7r5Mj1frUSoQ3', 'EUwFwIa9RhhA0y84vV', 'qnbJsWcestqFm4lt9c', 'uCSrdb7B9GDDPpnkO5'
          Source: 0.0.Dgc1mwB234.exe.110000.0.unpack, zsKCbvMEqdplulquC5/l83ecsIQRYPU9U2WDW.csHigh entropy of concatenated method names: 'I5K8uZpD7H', 'mF583XMeqW', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'roYdQD2h0yQjGEh2C9Q', 'RLjTxv28FEAwN9Gf6Kc', 'usXvsr2mPlZhnIfkwA9'
          Source: 0.0.Dgc1mwB234.exe.110000.0.unpack, wy1AdR1np9WlJVqIhu/Cie2rZaBGedqv9947T.csHigh entropy of concatenated method names: 'SlkGgsDX3i', 'bHpGLEUxQy', 'qnKGHPdynA', 'vmdGOEeoJ3', '.ctor', 'hwmGEk16El', 'KQXfyj2zJQ8MrBNeABL', 'pivo7TxOtTwwmcNRlOI', 'tY9QjbxHxcRGrnLGAu4', 'qfGsQdx20MZXaBbxQtj'
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeFile created: C:\Users\user\AppData\Roaming\CXFxEHIAOoJFws.exeJump to dropped file

          Boot Survival:

          barindex
          Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CXFxEHIAOoJFws' /XML 'C:\Users\user\AppData\Local\Temp\tmpC9C9.tmp'

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe:Zone.Identifier read attributes | delete
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 0.2.Dgc1mwB234.exe.2807aac.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.253245800.0000000002801000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Dgc1mwB234.exe PID: 6408, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: Dgc1mwB234.exe, 00000000.00000002.253245800.0000000002801000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: Dgc1mwB234.exe, 00000000.00000002.253245800.0000000002801000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\Dgc1mwB234.exe TID: 6412Thread sleep time: -37098s >= -30000s
          Source: C:\Users\user\Desktop\Dgc1mwB234.exe TID: 6440Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: foregroundWindowGot 640
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: foregroundWindowGot 748
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeThread delayed: delay time: 37098
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
          Source: Dgc1mwB234.exe, 00000000.00000002.253245800.0000000002801000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
          Source: Dgc1mwB234.exe, 00000000.00000002.253245800.0000000002801000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: Dgc1mwB234.exe, 00000000.00000002.253245800.0000000002801000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: RegSvcs.exe, 00000006.00000003.294917202.00000000015C7000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: Dgc1mwB234.exe, 00000000.00000002.253245800.0000000002801000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Writes to foreign memory regionsShow sources
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 402000
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 420000
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 422000
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 100F008
          Allocates memory in foreign processesShow sources
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 protect: page execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CXFxEHIAOoJFws' /XML 'C:\Users\user\AppData\Local\Temp\tmpC9C9.tmp'
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Users\user\Desktop\Dgc1mwB234.exeCode function: 0_2_022BA2F6 GetUserNameW,

          Stealing of Sensitive Information:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0.2.Dgc1mwB234.exe.38ef178.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Dgc1mwB234.exe.38ef178.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.253904015.0000000003801000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.254807423.0000000003B0F000.00000004.00000001.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0.2.Dgc1mwB234.exe.38ef178.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Dgc1mwB234.exe.38ef178.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.253904015.0000000003801000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.254807423.0000000003B0F000.00000004.00000001.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsScheduled Task/Job1Scheduled Task/Job1Access Token Manipulation1Masquerading1OS Credential DumpingSecurity Software Discovery11Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection311Disable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection311LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing12Proc FilesystemFile and Directory Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Information Discovery12Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 508639 Sample: Dgc1mwB234 Startdate: 25/10/2021 Architecture: WINDOWS Score: 100 31 newme122.3utilities.com 2->31 33 newme1122.3utilities.com 2->33 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Antivirus detection for URL or domain 2->45 47 10 other signatures 2->47 8 Dgc1mwB234.exe 7 2->8         started        signatures3 process4 file5 21 C:\Users\user\AppData\...\CXFxEHIAOoJFws.exe, PE32 8->21 dropped 23 C:\...\CXFxEHIAOoJFws.exe:Zone.Identifier, ASCII 8->23 dropped 25 C:\Users\user\AppData\Local\...\tmpC9C9.tmp, XML 8->25 dropped 27 C:\Users\user\AppData\...\Dgc1mwB234.exe.log, ASCII 8->27 dropped 49 Uses schtasks.exe or at.exe to add and modify task schedules 8->49 51 Writes to foreign memory regions 8->51 53 Allocates memory in foreign processes 8->53 55 Injects a PE file into a foreign processes 8->55 12 RegSvcs.exe 8 8->12         started        17 schtasks.exe 1 8->17         started        signatures6 process7 dnsIp8 35 newme122.3utilities.com 23.105.131.228, 49778, 49783, 49784 LEASEWEB-USA-NYC-11US United States 12->35 37 newme1122.3utilities.com 12->37 39 192.168.2.1 unknown unknown 12->39 29 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 12->29 dropped 57 Hides that the sample has been downloaded from the Internet (zone.identifier) 12->57 19 conhost.exe 17->19         started        file9 signatures10 process11

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          Dgc1mwB234.exe54%VirustotalBrowse
          Dgc1mwB234.exe100%Joe Sandbox ML

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\CXFxEHIAOoJFws.exe100%Joe Sandbox ML

          Unpacked PE Files

          No Antivirus matches

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cnN0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.sajatypeworks.combli0%Avira URL Cloudsafe
          http://www.collada.org/2005/11/COLLADASchema9Done0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cnl-g0%URL Reputationsafe
          newme122.3utilities.com100%Avira URL Cloudphishing
          http://www.tiro.comcm0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/k0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sajatypeworks.comblix5M0%Avira URL Cloudsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.founder.com.cn/cng0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.fontbureau.comlde0%Avira URL Cloudsafe
          http://www.fonts.comc0%URL Reputationsafe
          newme1122.3utilities.com100%Avira URL Cloudphishing
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.founder.com.cn/cnngH0%Avira URL Cloudsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Negr0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/y0%URL Reputationsafe
          http://www.fontbureau.comk0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn70%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/p0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y0-e0%Avira URL Cloudsafe
          http://www.founder.com.cn/cnate0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/b0%URL Reputationsafe
          http://www.fonts.com-u0%URL Reputationsafe
          http://www.founder.com.cn/cn#0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/no0%Avira URL Cloudsafe
          http://www.sandoll.co.krre0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          newme122.3utilities.com
          23.105.131.228
          truetrue
            unknown
            newme1122.3utilities.com
            unknown
            unknowntrue
              unknown

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              newme122.3utilities.comtrue
              • Avira URL Cloud: phishing
              unknown
              newme1122.3utilities.comtrue
              • Avira URL Cloud: phishing
              unknown

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://www.founder.com.cn/cnNDgc1mwB234.exe, 00000000.00000003.236853218.0000000004C1D000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designersGDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designers/?Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                    high
                    http://www.tiro.comDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersDgc1mwB234.exe, 00000000.00000003.239894261.0000000004BE9000.00000004.00000001.sdmpfalse
                      high
                      http://www.fontbureau.com/designersZDgc1mwB234.exe, 00000000.00000003.240273446.0000000004BED000.00000004.00000001.sdmpfalse
                        high
                        http://www.goodfont.co.krDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.combliDgc1mwB234.exe, 00000000.00000003.235043877.0000000004BFB000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.collada.org/2005/11/COLLADASchema9DoneDgc1mwB234.exe, 00000000.00000002.253245800.0000000002801000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comDgc1mwB234.exe, 00000000.00000003.235043877.0000000004BFB000.00000004.00000001.sdmp, Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/cTheDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnl-gDgc1mwB234.exe, 00000000.00000003.236772569.0000000004C1D000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.tiro.comcmDgc1mwB234.exe, 00000000.00000003.235298130.0000000004BFB000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/jp/kDgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.galapagosdesign.com/DPleaseDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fonts.comDgc1mwB234.exe, 00000000.00000003.235069123.0000000004BFB000.00000004.00000001.sdmpfalse
                          high
                          http://www.sandoll.co.krDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sajatypeworks.comblix5MDgc1mwB234.exe, 00000000.00000003.235094479.0000000004C04000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.urwpp.deDPleaseDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cnDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cngDgc1mwB234.exe, 00000000.00000003.236772569.0000000004C1D000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sakkal.comDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comldeDgc1mwB234.exe, 00000000.00000003.252140639.0000000004BE0000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                            high
                            http://www.fontbureau.comDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                              high
                              http://www.fonts.comcDgc1mwB234.exe, 00000000.00000003.235103191.0000000004BFB000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/jp/Dgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnngHDgc1mwB234.exe, 00000000.00000003.236982143.0000000004BE4000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.carterandcone.comlDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/NegrDgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/yDgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/cabarga.htmlNDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                                high
                                http://www.fontbureau.comkDgc1mwB234.exe, 00000000.00000003.252140639.0000000004BE0000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cnDgc1mwB234.exe, 00000000.00000003.236789899.0000000004BE4000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/frere-jones.htmlDgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn7Dgc1mwB234.exe, 00000000.00000003.236772569.0000000004C1D000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/pDgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmp, Dgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/Y0-eDgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.com/designers8Dgc1mwB234.exe, 00000000.00000002.256921442.0000000005E72000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cnateDgc1mwB234.exe, 00000000.00000003.236789899.0000000004BE4000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/bDgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fonts.com-uDgc1mwB234.exe, 00000000.00000003.235043877.0000000004BFB000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cn#Dgc1mwB234.exe, 00000000.00000003.236789899.0000000004BE4000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/noDgc1mwB234.exe, 00000000.00000003.238113594.0000000004BE4000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.sandoll.co.krreDgc1mwB234.exe, 00000000.00000003.236089540.0000000004BE6000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown

                                    Contacted IPs

                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs

                                    Public

                                    IPDomainCountryFlagASNASN NameMalicious
                                    23.105.131.228
                                    newme122.3utilities.comUnited States
                                    396362LEASEWEB-USA-NYC-11UStrue

                                    Private

                                    IP
                                    192.168.2.1

                                    General Information

                                    Joe Sandbox Version:33.0.0 White Diamond
                                    Analysis ID:508639
                                    Start date:25.10.2021
                                    Start time:13:17:18
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 8m 33s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:Dgc1mwB234 (renamed file extension from none to exe)
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:29
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@6/5@49/2
                                    EGA Information:Failed
                                    HDC Information:
                                    • Successful, ratio: 4.9% (good quality ratio 3.6%)
                                    • Quality average: 61.1%
                                    • Quality standard deviation: 41.4%
                                    HCA Information:
                                    • Successful, ratio: 80%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    Warnings:
                                    Show All
                                    • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                    • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                    • Excluded IPs from analysis (whitelisted): 23.211.6.115, 23.211.4.86, 20.82.210.154, 209.197.3.8, 40.112.88.60, 80.67.82.235, 80.67.82.211, 20.50.102.62
                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, wu-shim.trafficmanager.net, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, store-images.s-microsoft.com-c.edgekey.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, cds.d2s7q6s2.hwcdn.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, arc.trafficmanager.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.

                                    Simulations

                                    Behavior and APIs

                                    TimeTypeDescription
                                    13:18:17API Interceptor1x Sleep call for process: Dgc1mwB234.exe modified
                                    13:18:21API Interceptor958x Sleep call for process: RegSvcs.exe modified

                                    Joe Sandbox View / Context

                                    IPs

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    23.105.131.228Sts Global Order.xlsxGet hashmaliciousBrowse
                                      R7nWmIxbbl.exeGet hashmaliciousBrowse
                                        ubwJ8nHmzP.exeGet hashmaliciousBrowse
                                          PO #11325201021.xlsxGet hashmaliciousBrowse
                                            HSBC.exeGet hashmaliciousBrowse
                                              UUGCfhIdFD.exeGet hashmaliciousBrowse
                                                KPcrOQcb5P.exeGet hashmaliciousBrowse
                                                  rGsJ1mXomJ.exeGet hashmaliciousBrowse

                                                    Domains

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    newme122.3utilities.comSts Global Order.xlsxGet hashmaliciousBrowse
                                                    • 23.105.131.228
                                                    R7nWmIxbbl.exeGet hashmaliciousBrowse
                                                    • 23.105.131.228
                                                    product specification.xlsxGet hashmaliciousBrowse
                                                    • 23.105.131.228
                                                    PO 11325201021.xlsxGet hashmaliciousBrowse
                                                    • 23.105.131.228
                                                    ubwJ8nHmzP.exeGet hashmaliciousBrowse
                                                    • 23.105.131.228
                                                    PO #11325201021.xlsxGet hashmaliciousBrowse
                                                    • 23.105.131.228

                                                    ASN

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    LEASEWEB-USA-NYC-11USSts Global Order.xlsxGet hashmaliciousBrowse
                                                    • 23.105.131.228
                                                    R7nWmIxbbl.exeGet hashmaliciousBrowse
                                                    • 23.105.131.228
                                                    ubwJ8nHmzP.exeGet hashmaliciousBrowse
                                                    • 23.105.131.228
                                                    PO #11325201021.xlsxGet hashmaliciousBrowse
                                                    • 23.105.131.228
                                                    Invoice Payment.exeGet hashmaliciousBrowse
                                                    • 23.105.131.236
                                                    Invoice Payment.exeGet hashmaliciousBrowse
                                                    • 23.105.131.236
                                                    order copy.pdf.exeGet hashmaliciousBrowse
                                                    • 23.105.131.161
                                                    Scan3094-03.exeGet hashmaliciousBrowse
                                                    • 23.105.131.220
                                                    payment details.pdf.exeGet hashmaliciousBrowse
                                                    • 23.105.131.206
                                                    C06689-L2C.pdf.exeGet hashmaliciousBrowse
                                                    • 23.105.131.206
                                                    OKNYaX8JqF.exeGet hashmaliciousBrowse
                                                    • 23.105.131.161
                                                    lt.exeGet hashmaliciousBrowse
                                                    • 23.105.131.161
                                                    triage_dropped_file.exeGet hashmaliciousBrowse
                                                    • 23.105.131.161
                                                    Payment Slips.exeGet hashmaliciousBrowse
                                                    • 23.105.131.236
                                                    order copy.pdf.exeGet hashmaliciousBrowse
                                                    • 23.105.131.161
                                                    Po requirements documents.jarGet hashmaliciousBrowse
                                                    • 23.105.131.187
                                                    xd.armGet hashmaliciousBrowse
                                                    • 142.91.50.26
                                                    Payment Receipt.exeGet hashmaliciousBrowse
                                                    • 23.105.131.212
                                                    SoftFun.exeGet hashmaliciousBrowse
                                                    • 23.105.131.196

                                                    JA3 Fingerprints

                                                    No context

                                                    Dropped Files

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    C:\Users\user\AppData\Roaming\CXFxEHIAOoJFws.exeSts Global Order.xlsxGet hashmaliciousBrowse

                                                      Created / dropped Files

                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Dgc1mwB234.exe.log
                                                      Process:C:\Users\user\Desktop\Dgc1mwB234.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:modified
                                                      Size (bytes):525
                                                      Entropy (8bit):5.2874233355119316
                                                      Encrypted:false
                                                      SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                                      MD5:61CCF53571C9ABA6511D696CB0D32E45
                                                      SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                                      SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                                      SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                      C:\Users\user\AppData\Local\Temp\tmpC9C9.tmp
                                                      Process:C:\Users\user\Desktop\Dgc1mwB234.exe
                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1651
                                                      Entropy (8bit):5.182603126812438
                                                      Encrypted:false
                                                      SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBbtn:cbhC7ZlNQF/rydbz9I3YODOLNdq3/
                                                      MD5:00E8857F4F5DC7FC50BDDC5C9E5F4E5F
                                                      SHA1:B80150A76AF4D548F6DB2046C30DDAED5703D9AA
                                                      SHA-256:9DDBD3962EB721086ED2EB39C9CCD4DC5D2E834DE01B0E040619E654E237FF36
                                                      SHA-512:C3318E2F6A23C16819AD381F95A2025DA64418D898C34301EA7E6A7BFAF610CA3B83B66A7D5F5FFC34C2C3146E554D0F468C9359AE18373A0E912A6CE99E8EB3
                                                      Malicious:true
                                                      Reputation:low
                                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                      C:\Users\user\AppData\Roaming\CXFxEHIAOoJFws.exe
                                                      Process:C:\Users\user\Desktop\Dgc1mwB234.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1085952
                                                      Entropy (8bit):7.900410175742084
                                                      Encrypted:false
                                                      SSDEEP:24576:vT120Gers/orbvtIeOIPr6e/kbHYI42Pv+1vVi:vhqC4o+l4rLsbHz42Pu
                                                      MD5:5DC1D41E2F9969D85896921F7B4AE261
                                                      SHA1:8DAE6EB305EAD57EEDDFDECBF34CCA61AF653973
                                                      SHA-256:2A95FEDE08D035E26D8A261C58359901344D23395094BD51F32E868964D61634
                                                      SHA-512:96AA1DC7A5780FE484120B32CA2B66234450787370A0CC7B25AFBFFDE7C4AE5DBFF84FC496C8D92FF8AB3507FDFA361CF055E2910B72085F02956647A240FB63
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      Joe Sandbox View:
                                                      • Filename: Sts Global Order.xlsx, Detection: malicious, Browse
                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ua............................~.... ........@.. ....................................@.................................0...K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................`.......H............\..........8...............................................0..........+.&.(....(....:....& ....87...8......(..... ....8 ......(........X.8.... ............E....................9...d...*...N...........u... ....8...... ....8........8....& ....8....(.... ....8..... ....(.... ....8......o....?C... ....8k.....(.... ....8Z....*...J+.&.........o....*.>+.&......(....*>+.&......(....*.+.&..(....*.+.&..*..+.&..*..0..........+.&..~......e(........8.....*....0..........+.&.
                                                      C:\Users\user\AppData\Roaming\CXFxEHIAOoJFws.exe:Zone.Identifier
                                                      Process:C:\Users\user\Desktop\Dgc1mwB234.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):26
                                                      Entropy (8bit):3.95006375643621
                                                      Encrypted:false
                                                      SSDEEP:3:ggPYV:rPYV
                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                      Malicious:true
                                                      Preview: [ZoneTransfer]....ZoneId=0
                                                      C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                      File Type:Non-ISO extended-ASCII text, with no line terminators, with escape sequences
                                                      Category:dropped
                                                      Size (bytes):8
                                                      Entropy (8bit):2.75
                                                      Encrypted:false
                                                      SSDEEP:3:iltn:W
                                                      MD5:06525540CB844935ABCA240202343F17
                                                      SHA1:B9E0FECE004A2732649641BEB0275732613C3409
                                                      SHA-256:49D90FCC29BD2DBEFA8D09221B0338810DFF1E453F91B252B0F196262FC388E2
                                                      SHA-512:61921414432E97302950505A7DB24E3778DEEE7476D859220987171AE6A233672A930922C134DAB8442F187404C840CB82A6F70932B7AC67E27224B090C0F35C
                                                      Malicious:true
                                                      Preview: .......H

                                                      Static File Info

                                                      General

                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):7.900410175742084
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                      • Win32 Executable (generic) a (10002005/4) 49.97%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      • DOS Executable Generic (2002/1) 0.01%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:Dgc1mwB234.exe
                                                      File size:1085952
                                                      MD5:5dc1d41e2f9969d85896921f7b4ae261
                                                      SHA1:8dae6eb305ead57eeddfdecbf34cca61af653973
                                                      SHA256:2a95fede08d035e26d8a261c58359901344d23395094bd51f32e868964d61634
                                                      SHA512:96aa1dc7a5780fe484120b32ca2b66234450787370a0cc7b25afbffde7c4ae5dbff84fc496c8d92ff8ab3507fdfa361cf055e2910b72085f02956647a240fb63
                                                      SSDEEP:24576:vT120Gers/orbvtIeOIPr6e/kbHYI42Pv+1vVi:vhqC4o+l4rLsbHz42Pu
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ua............................~.... ........@.. ....................................@................................

                                                      File Icon

                                                      Icon Hash:00828e8e8686b000

                                                      Static PE Info

                                                      General

                                                      Entrypoint:0x50a67e
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                      Time Stamp:0x61750B88 [Sun Oct 24 07:30:16 2021 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:v2.0.50727
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                      Entrypoint Preview

                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al

                                                      Data Directories

                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x10a6300x4b.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x10c0000x5a8.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x10e0000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                      Sections

                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000x1086840x108800False0.939694035031data7.90482158823IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                      .rsrc0x10c0000x5a80x600False0.421223958333data4.08519384861IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x10e0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                      Resources

                                                      NameRVASizeTypeLanguageCountry
                                                      RT_VERSION0x10c0a00x31cdata
                                                      RT_MANIFEST0x10c3bc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                      Imports

                                                      DLLImport
                                                      mscoree.dll_CorExeMain

                                                      Version Infos

                                                      DescriptionData
                                                      Translation0x0000 0x04b0
                                                      LegalCopyrightCopyright 2017
                                                      Assembly Version1.0.0.0
                                                      InternalNameFormatt.exe
                                                      FileVersion1.0.0.0
                                                      CompanyName
                                                      LegalTrademarks
                                                      Comments
                                                      ProductNameGameLibrary
                                                      ProductVersion1.0.0.0
                                                      FileDescriptionGameLibrary
                                                      OriginalFilenameFormatt.exe

                                                      Network Behavior

                                                      Snort IDS Alerts

                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                      10/25/21-13:18:24.219605UDP254DNS SPOOF query response with TTL of 1 min. and no authority53551618.8.8.8192.168.2.5
                                                      10/25/21-13:18:29.754053UDP254DNS SPOOF query response with TTL of 1 min. and no authority53499928.8.8.8192.168.2.5
                                                      10/25/21-13:18:53.494242UDP254DNS SPOOF query response with TTL of 1 min. and no authority53544508.8.8.8192.168.2.5
                                                      10/25/21-13:19:04.362810UDP254DNS SPOOF query response with TTL of 1 min. and no authority53594138.8.8.8192.168.2.5
                                                      10/25/21-13:19:28.249267UDP254DNS SPOOF query response with TTL of 1 min. and no authority53509698.8.8.8192.168.2.5
                                                      10/25/21-13:19:52.354760UDP254DNS SPOOF query response with TTL of 1 min. and no authority53611508.8.8.8192.168.2.5
                                                      10/25/21-13:19:57.755074UDP254DNS SPOOF query response with TTL of 1 min. and no authority53504228.8.8.8192.168.2.5
                                                      10/25/21-13:20:20.952256UDP254DNS SPOOF query response with TTL of 1 min. and no authority53628478.8.8.8192.168.2.5

                                                      Network Port Distribution

                                                      TCP Packets

                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Oct 25, 2021 13:18:24.229736090 CEST497788822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:18:24.331218004 CEST88224977823.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:18:24.843277931 CEST497788822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:18:24.944647074 CEST88224977823.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:18:25.452764034 CEST497788822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:18:25.553905010 CEST88224977823.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:18:29.756159067 CEST497838822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:18:29.858155966 CEST88224978323.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:18:30.375091076 CEST497838822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:18:30.477061033 CEST88224978323.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:18:30.984760046 CEST497838822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:18:31.086971045 CEST88224978323.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:18:35.251679897 CEST497848822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:18:35.353919983 CEST88224978423.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:18:35.876008034 CEST497848822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:18:35.978415966 CEST88224978423.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:18:36.485008001 CEST497848822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:18:36.587162018 CEST88224978423.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:18:53.495866060 CEST497878822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:18:53.597923040 CEST88224978723.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:18:54.111454010 CEST497878822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:18:54.213706017 CEST88224978723.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:18:54.720803976 CEST497878822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:18:54.822851896 CEST88224978723.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:18:58.914319992 CEST497898822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:18:59.016427994 CEST88224978923.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:18:59.518157959 CEST497898822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:18:59.620444059 CEST88224978923.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:00.127527952 CEST497898822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:00.229479074 CEST88224978923.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:04.364578962 CEST497908822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:04.466742992 CEST88224979023.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:04.971772909 CEST497908822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:05.073801994 CEST88224979023.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:05.581149101 CEST497908822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:05.684072018 CEST88224979023.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:22.679969072 CEST498248822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:22.782475948 CEST88224982423.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:23.285787106 CEST498248822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:23.387103081 CEST88224982423.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:23.895737886 CEST498248822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:23.999279976 CEST88224982423.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:28.250555038 CEST498268822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:28.352610111 CEST88224982623.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:28.864268064 CEST498268822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:28.966200113 CEST88224982623.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:29.473709106 CEST498268822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:29.575668097 CEST88224982623.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:34.481539011 CEST498278822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:34.582684040 CEST88224982723.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:35.100047112 CEST498278822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:35.201267004 CEST88224982723.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:35.708621025 CEST498278822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:35.810509920 CEST88224982723.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:52.356185913 CEST498298822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:52.461040974 CEST88224982923.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:52.975768089 CEST498298822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:53.077406883 CEST88224982923.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:53.585244894 CEST498298822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:53.687624931 CEST88224982923.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:57.757257938 CEST498338822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:57.859532118 CEST88224983323.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:58.366944075 CEST498338822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:58.470392942 CEST88224983323.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:19:58.976372004 CEST498338822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:19:59.079014063 CEST88224983323.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:20:03.231915951 CEST498348822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:20:03.333264112 CEST88224983423.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:20:03.836040974 CEST498348822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:20:03.937845945 CEST88224983423.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:20:04.445617914 CEST498348822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:20:04.550070047 CEST88224983423.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:20:20.952842951 CEST498358822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:20:21.055294037 CEST88224983523.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:20:21.556330919 CEST498358822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:20:21.658687115 CEST88224983523.105.131.228192.168.2.5
                                                      Oct 25, 2021 13:20:22.166929960 CEST498358822192.168.2.523.105.131.228
                                                      Oct 25, 2021 13:20:22.271866083 CEST88224983523.105.131.228192.168.2.5

                                                      UDP Packets

                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Oct 25, 2021 13:18:24.198946953 CEST5516153192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:18:24.219604969 CEST53551618.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:18:29.733983994 CEST4999253192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:18:29.754053116 CEST53499928.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:18:35.230837107 CEST6007553192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:18:35.249157906 CEST53600758.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:18:40.718759060 CEST6434553192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:18:40.737077951 CEST53643458.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:18:40.830085039 CEST5712853192.168.2.58.8.4.4
                                                      Oct 25, 2021 13:18:40.849956989 CEST53571288.8.4.4192.168.2.5
                                                      Oct 25, 2021 13:18:41.138411999 CEST5479153192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:18:41.158586025 CEST53547918.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:18:45.225208044 CEST5046353192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:18:45.243746996 CEST53504638.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:18:45.248320103 CEST5039453192.168.2.58.8.4.4
                                                      Oct 25, 2021 13:18:45.264602900 CEST53503948.8.4.4192.168.2.5
                                                      Oct 25, 2021 13:18:45.282299995 CEST5853053192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:18:45.300805092 CEST53585308.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:18:49.340221882 CEST5381353192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:18:49.357217073 CEST53538138.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:18:49.359814882 CEST6373253192.168.2.58.8.4.4
                                                      Oct 25, 2021 13:18:49.380017996 CEST53637328.8.4.4192.168.2.5
                                                      Oct 25, 2021 13:18:49.389332056 CEST5734453192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:18:49.407651901 CEST53573448.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:18:53.474283934 CEST5445053192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:18:53.494241953 CEST53544508.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:18:58.894469976 CEST5715153192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:18:58.912807941 CEST53571518.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:04.341650963 CEST5941353192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:04.362809896 CEST53594138.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:09.763780117 CEST5164953192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:09.782102108 CEST53516498.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:09.785937071 CEST6508653192.168.2.58.8.4.4
                                                      Oct 25, 2021 13:19:09.807462931 CEST53650868.8.4.4192.168.2.5
                                                      Oct 25, 2021 13:19:09.816464901 CEST5643253192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:09.832590103 CEST53564328.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:13.960675955 CEST5292953192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:13.979291916 CEST53529298.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:14.020601034 CEST6431753192.168.2.58.8.4.4
                                                      Oct 25, 2021 13:19:14.037285089 CEST53643178.8.4.4192.168.2.5
                                                      Oct 25, 2021 13:19:14.045154095 CEST6100453192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:14.061564922 CEST53610048.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:18.100016117 CEST6237253192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:18.116606951 CEST53623728.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:18.120496988 CEST6151553192.168.2.58.8.4.4
                                                      Oct 25, 2021 13:19:18.139111996 CEST53615158.8.4.4192.168.2.5
                                                      Oct 25, 2021 13:19:18.290654898 CEST5667553192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:18.312757969 CEST53566758.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:22.662142038 CEST5526753192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:22.678601027 CEST53552678.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:28.229417086 CEST5096953192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:28.249267101 CEST53509698.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:34.461467981 CEST6436253192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:34.479782104 CEST53643628.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:39.867782116 CEST5476653192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:39.888752937 CEST53547668.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:39.892514944 CEST6144653192.168.2.58.8.4.4
                                                      Oct 25, 2021 13:19:39.911220074 CEST53614468.8.4.4192.168.2.5
                                                      Oct 25, 2021 13:19:39.961859941 CEST5751553192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:39.980130911 CEST53575158.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:44.046120882 CEST5819953192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:44.064822912 CEST53581998.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:44.068089008 CEST6522153192.168.2.58.8.4.4
                                                      Oct 25, 2021 13:19:44.087538004 CEST53652218.8.4.4192.168.2.5
                                                      Oct 25, 2021 13:19:44.135345936 CEST6157353192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:44.152204990 CEST53615738.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:48.197417021 CEST5656253192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:48.213984966 CEST53565628.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:48.216640949 CEST5359153192.168.2.58.8.4.4
                                                      Oct 25, 2021 13:19:48.233685970 CEST53535918.8.4.4192.168.2.5
                                                      Oct 25, 2021 13:19:48.245408058 CEST5968853192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:48.265573978 CEST53596888.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:52.333348036 CEST6115053192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:52.354759932 CEST53611508.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:19:57.733491898 CEST5042253192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:19:57.755074024 CEST53504228.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:20:03.210098982 CEST5324753192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:20:03.229873896 CEST53532478.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:20:08.594829082 CEST5854453192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:20:08.611241102 CEST53585448.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:20:08.642641068 CEST5381453192.168.2.58.8.4.4
                                                      Oct 25, 2021 13:20:08.663342953 CEST53538148.8.4.4192.168.2.5
                                                      Oct 25, 2021 13:20:08.674236059 CEST5130553192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:20:08.694509983 CEST53513058.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:20:12.726998091 CEST5367053192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:20:12.747287035 CEST53536708.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:20:12.759303093 CEST5516053192.168.2.58.8.4.4
                                                      Oct 25, 2021 13:20:12.775943041 CEST53551608.8.4.4192.168.2.5
                                                      Oct 25, 2021 13:20:12.813448906 CEST6141453192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:20:12.831873894 CEST53614148.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:20:16.842833996 CEST6384753192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:20:16.861476898 CEST53638478.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:20:16.862308025 CEST6152353192.168.2.58.8.4.4
                                                      Oct 25, 2021 13:20:16.878818989 CEST53615238.8.4.4192.168.2.5
                                                      Oct 25, 2021 13:20:16.881802082 CEST5055153192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:20:16.900333881 CEST53505518.8.8.8192.168.2.5
                                                      Oct 25, 2021 13:20:20.932284117 CEST6284753192.168.2.58.8.8.8
                                                      Oct 25, 2021 13:20:20.952255964 CEST53628478.8.8.8192.168.2.5

                                                      DNS Queries

                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                      Oct 25, 2021 13:18:24.198946953 CEST192.168.2.58.8.8.80xe096Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:29.733983994 CEST192.168.2.58.8.8.80x6424Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:35.230837107 CEST192.168.2.58.8.8.80x2c3Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:40.718759060 CEST192.168.2.58.8.8.80x43b0Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:40.830085039 CEST192.168.2.58.8.4.40x454aStandard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:41.138411999 CEST192.168.2.58.8.8.80xac7aStandard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:45.225208044 CEST192.168.2.58.8.8.80x3252Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:45.248320103 CEST192.168.2.58.8.4.40x70f8Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:45.282299995 CEST192.168.2.58.8.8.80x6c8eStandard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:49.340221882 CEST192.168.2.58.8.8.80x78c4Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:49.359814882 CEST192.168.2.58.8.4.40xb3b1Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:49.389332056 CEST192.168.2.58.8.8.80xa19bStandard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:53.474283934 CEST192.168.2.58.8.8.80xffdfStandard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:58.894469976 CEST192.168.2.58.8.8.80xd637Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:04.341650963 CEST192.168.2.58.8.8.80x9a71Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:09.763780117 CEST192.168.2.58.8.8.80xca07Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:09.785937071 CEST192.168.2.58.8.4.40x903bStandard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:09.816464901 CEST192.168.2.58.8.8.80xf3bStandard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:13.960675955 CEST192.168.2.58.8.8.80xf5c8Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:14.020601034 CEST192.168.2.58.8.4.40x44eStandard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:14.045154095 CEST192.168.2.58.8.8.80xc4e7Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:18.100016117 CEST192.168.2.58.8.8.80x8bc5Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:18.120496988 CEST192.168.2.58.8.4.40xa92dStandard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:18.290654898 CEST192.168.2.58.8.8.80xb2c0Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:22.662142038 CEST192.168.2.58.8.8.80xa181Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:28.229417086 CEST192.168.2.58.8.8.80xde8Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:34.461467981 CEST192.168.2.58.8.8.80xba08Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:39.867782116 CEST192.168.2.58.8.8.80xce9fStandard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:39.892514944 CEST192.168.2.58.8.4.40x9d3bStandard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:39.961859941 CEST192.168.2.58.8.8.80x7216Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:44.046120882 CEST192.168.2.58.8.8.80xe05Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:44.068089008 CEST192.168.2.58.8.4.40x66e2Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:44.135345936 CEST192.168.2.58.8.8.80xb3e2Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:48.197417021 CEST192.168.2.58.8.8.80xa202Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:48.216640949 CEST192.168.2.58.8.4.40x89a7Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:48.245408058 CEST192.168.2.58.8.8.80x4aebStandard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:52.333348036 CEST192.168.2.58.8.8.80xc76dStandard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:57.733491898 CEST192.168.2.58.8.8.80x587fStandard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:20:03.210098982 CEST192.168.2.58.8.8.80x4f04Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:20:08.594829082 CEST192.168.2.58.8.8.80x5b3fStandard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:20:08.642641068 CEST192.168.2.58.8.4.40xf0ceStandard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:20:08.674236059 CEST192.168.2.58.8.8.80x7170Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:20:12.726998091 CEST192.168.2.58.8.8.80x3ef4Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:20:12.759303093 CEST192.168.2.58.8.4.40x8d1Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:20:12.813448906 CEST192.168.2.58.8.8.80x7ab5Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:20:16.842833996 CEST192.168.2.58.8.8.80xd61Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:20:16.862308025 CEST192.168.2.58.8.4.40xb62fStandard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:20:16.881802082 CEST192.168.2.58.8.8.80xb4f3Standard query (0)newme1122.3utilities.comA (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:20:20.932284117 CEST192.168.2.58.8.8.80x9ad7Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)

                                                      DNS Answers

                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                      Oct 25, 2021 13:18:24.219604969 CEST8.8.8.8192.168.2.50xe096No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:29.754053116 CEST8.8.8.8192.168.2.50x6424No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:35.249157906 CEST8.8.8.8192.168.2.50x2c3No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:53.494241953 CEST8.8.8.8192.168.2.50xffdfNo error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:18:58.912807941 CEST8.8.8.8192.168.2.50xd637No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:04.362809896 CEST8.8.8.8192.168.2.50x9a71No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:22.678601027 CEST8.8.8.8192.168.2.50xa181No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:28.249267101 CEST8.8.8.8192.168.2.50xde8No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:34.479782104 CEST8.8.8.8192.168.2.50xba08No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:52.354759932 CEST8.8.8.8192.168.2.50xc76dNo error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:19:57.755074024 CEST8.8.8.8192.168.2.50x587fNo error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:20:03.229873896 CEST8.8.8.8192.168.2.50x4f04No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                                                      Oct 25, 2021 13:20:20.952255964 CEST8.8.8.8192.168.2.50x9ad7No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)

                                                      Code Manipulations

                                                      Statistics

                                                      Behavior

                                                      Click to jump to process

                                                      System Behavior

                                                      General

                                                      Start time:13:18:11
                                                      Start date:25/10/2021
                                                      Path:C:\Users\user\Desktop\Dgc1mwB234.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:'C:\Users\user\Desktop\Dgc1mwB234.exe'
                                                      Imagebase:0x110000
                                                      File size:1085952 bytes
                                                      MD5 hash:5DC1D41E2F9969D85896921F7B4AE261
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.253245800.0000000002801000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.253904015.0000000003801000.00000004.00000001.sdmp, Author: Florian Roth
                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.253904015.0000000003801000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.253904015.0000000003801000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.254807423.0000000003B0F000.00000004.00000001.sdmp, Author: Florian Roth
                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.254807423.0000000003B0F000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.254807423.0000000003B0F000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                      Reputation:low

                                                      General

                                                      Start time:13:18:19
                                                      Start date:25/10/2021
                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CXFxEHIAOoJFws' /XML 'C:\Users\user\AppData\Local\Temp\tmpC9C9.tmp'
                                                      Imagebase:0x270000
                                                      File size:185856 bytes
                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      General

                                                      Start time:13:18:19
                                                      Start date:25/10/2021
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff7ecfc0000
                                                      File size:625664 bytes
                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      General

                                                      Start time:13:18:20
                                                      Start date:25/10/2021
                                                      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                      Imagebase:0xe60000
                                                      File size:32768 bytes
                                                      MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Reputation:moderate

                                                      Disassembly

                                                      Code Analysis

                                                      Reset < >