Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HOANG HA TRADING - PRODUCTS LIST.exe

Overview

General Information

Sample Name:HOANG HA TRADING - PRODUCTS LIST.exe
Analysis ID:561384
MD5:3588f04ddba594909215ffa819d1a655
SHA1:1b350c789c3882acac391806dbc1ecb44632a297
SHA256:f35f5f2a4c1f89f26553ddb83c8df510a492873975224dee57e386b9fbc0795a
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sigma detected: Suspicius Add Task From User AppData Temp
Machine Learning detection for sample
.NET source code contains potential unpacker
Sigma detected: Powershell Defender Exclusion
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Creates processes with suspicious names
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • HOANG HA TRADING - PRODUCTS LIST.exe (PID: 3576 cmdline: "C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe" MD5: 3588F04DDBA594909215FFA819D1A655)
    • powershell.exe (PID: 6284 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 6300 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "2df65f40-d688-48d5-8802-f573ead9", "Group": "BILLION-1", "Domain1": "62.197.136.188", "Domain2": "127.0.0.1", "Port": 4052, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x2205:$x1: NanoCore.ClientPluginHost
  • 0x223e:$x2: IClientNetworkHost
0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x2205:$x2: NanoCore.ClientPluginHost
  • 0x2320:$s4: PipeCreated
  • 0x221f:$s5: IClientLoggingHost
0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    Click to see the 57 entries
    SourceRuleDescriptionAuthorStrings
    13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1deb:$x1: NanoCore.ClientPluginHost
    • 0x1e24:$x2: IClientNetworkHost
    13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x1deb:$x2: NanoCore.ClientPluginHost
    • 0x1f36:$s4: PipeCreated
    • 0x1e05:$s5: IClientLoggingHost
    13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x3deb:$x1: NanoCore.ClientPluginHost
    • 0x3f48:$x2: IClientNetworkHost
    13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x3deb:$x2: NanoCore.ClientPluginHost
    • 0x4d41:$s3: PipeExists
    • 0x3fe1:$s4: PipeCreated
    • 0x3e05:$s5: IClientLoggingHost
    13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    Click to see the 144 entries

    AV Detection

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe, ProcessId: 6460, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe, ProcessId: 6460, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    System Summary

    barindex
    Source: Process startedAuthor: frack113: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe" , ParentImage: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe, ParentProcessId: 3576, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp, ProcessId: 6300
    Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe" , ParentImage: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe, ParentProcessId: 3576, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe, ProcessId: 6284
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe" , ParentImage: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe, ParentProcessId: 3576, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe, ProcessId: 6284
    Source: Pipe createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: PipeName: \PSHost.132877898720977138.6284.DefaultAppDomain.powershell

    Stealing of Sensitive Information

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe, ProcessId: 6460, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe, ProcessId: 6460, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "2df65f40-d688-48d5-8802-f573ead9", "Group": "BILLION-1", "Domain1": "62.197.136.188", "Domain2": "127.0.0.1", "Port": 4052, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
    Source: HOANG HA TRADING - PRODUCTS LIST.exeVirustotal: Detection: 38%Perma Link
    Source: HOANG HA TRADING - PRODUCTS LIST.exeReversingLabs: Detection: 41%
    Source: 62.197.136.188Avira URL Cloud: Label: malware
    Source: C:\Users\user\AppData\Roaming\XWhIIIO.exeVirustotal: Detection: 38%Perma Link
    Source: C:\Users\user\AppData\Roaming\XWhIIIO.exeReversingLabs: Detection: 41%
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39dd051.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba4629.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTR
    Source: HOANG HA TRADING - PRODUCTS LIST.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Roaming\XWhIIIO.exeJoe Sandbox ML: detected
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpackAvira: Label: TR/NanoCore.fadte
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\CLwGpeArRS\src\obj\Debug\HashElementEnt.pdb8 source: HOANG HA TRADING - PRODUCTS LIST.exe, XWhIIIO.exe.0.dr
    Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\CLwGpeArRS\src\obj\Debug\HashElementEnt.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, XWhIIIO.exe.0.dr
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]

    Networking

    barindex
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49691 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49692 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49694 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49695 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49696 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49697 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49698 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49699 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49700 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49701 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49702 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49703 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49704 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49705 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49706 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49707 -> 62.197.136.188:4052
    Source: Malware configuration extractorURLs: 62.197.136.188
    Source: Malware configuration extractorURLs: 127.0.0.1
    Source: Joe Sandbox ViewASN Name: SPRINTLINKUS SPRINTLINKUS
    Source: global trafficTCP traffic: 192.168.2.3:49691 -> 62.197.136.188:4052
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://google.com
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341610591.0000000003071000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39dd051.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba4629.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTR

    System Summary

    barindex
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39881d4.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39dd051.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6860000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6900000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.51b0000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.397e5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6570000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5f50000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68b0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cd271e.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cc42ee.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6850000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.2a009a0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29f4758.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3979930.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba4629.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6850000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5f50000.21.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29c4e80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6890000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3979930.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6570000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.66e0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c0000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68b0000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cc42ee.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6880000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6880000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68ce8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6890000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6840000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6900000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6840000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cd271e.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.2a14fdc.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.2a009a0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29f4758.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.552454196.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.553587766.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.553547292.0000000006890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000002.553655349.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000002.553237518.0000000006570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39881d4.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39881d4.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39dd051.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39dd051.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6860000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6860000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6900000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6900000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.51b0000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.51b0000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.397e5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.397e5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6570000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6570000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5f50000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5f50000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68b0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68b0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cd271e.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cd271e.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cc42ee.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cc42ee.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6850000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6850000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.2a009a0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.2a009a0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29f4758.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29f4758.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3979930.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3979930.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba4629.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba4629.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6850000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6850000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5f50000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5f50000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29c4e80.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29c4e80.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6890000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6890000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3979930.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3979930.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6570000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6570000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.66e0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.66e0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c0000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c0000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68b0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68b0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cc42ee.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cc42ee.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6880000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6880000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6880000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6880000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68ce8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68ce8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6890000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6890000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6840000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6840000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6900000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6900000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6840000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6840000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cd271e.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cd271e.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.2a14fdc.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.2a009a0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29f4758.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.552454196.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.552454196.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.553587766.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553587766.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.553547292.0000000006890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553547292.0000000006890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000002.553655349.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553655349.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000002.553237518.0000000006570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553237518.0000000006570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 0_2_012EC1D4
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 0_2_012EE608
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 0_2_012EE618
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_05F502B0
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_06923F98
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_06920298
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_0692BBE8
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_0692B318
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_069229A0
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_0692F11A
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_0692AFD0
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_06920356
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_06924056
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_06924878
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_06FF15D8
    Source: HOANG HA TRADING - PRODUCTS LIST.exeBinary or memory string: OriginalFilename vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSafeSerializationManager.dll: vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345546984.0000000007540000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exeBinary or memory string: OriginalFilename vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exeBinary or memory string: OriginalFilename vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000003.359166317.0000000000B9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550216573.0000000003971000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550216573.0000000003971000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550216573.0000000003971000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553587766.00000000068B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553547292.0000000006890000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553237518.0000000006570000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553655349.0000000006900000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552789505.0000000005E00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exeBinary or memory string: OriginalFilenameHashElementEnt.exe2 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: XWhIIIO.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: HOANG HA TRADING - PRODUCTS LIST.exeVirustotal: Detection: 38%
    Source: HOANG HA TRADING - PRODUCTS LIST.exeReversingLabs: Detection: 41%
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile read: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe:Zone.IdentifierJump to behavior
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe "C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe"
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: C:\Users\user\AppData\Roaming\XWhIIIO.exeJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF354.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.evad.winEXE@11/12@0/1
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6292:120:WilError_01
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeMutant created: \Sessions\1\BaseNamedObjects\YzlPKyxwEbhsnjV
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{2df65f40-d688-48d5-8802-f573ead9f587}
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6400:120:WilError_01
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\CLwGpeArRS\src\obj\Debug\HashElementEnt.pdb8 source: HOANG HA TRADING - PRODUCTS LIST.exe, XWhIIIO.exe.0.dr
    Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\CLwGpeArRS\src\obj\Debug\HashElementEnt.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, XWhIIIO.exe.0.dr
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: XWhIIIO.exe.0.dr, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 0.0.HOANG HA TRADING - PRODUCTS LIST.exe.a60000.0.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.a60000.0.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 12.0.HOANG HA TRADING - PRODUCTS LIST.exe.350000.1.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 12.0.HOANG HA TRADING - PRODUCTS LIST.exe.350000.0.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 12.2.HOANG HA TRADING - PRODUCTS LIST.exe.350000.0.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.490000.1.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.490000.0.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.490000.11.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_069221D0 push es; ret
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_069221F0 push es; ret
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_06FF0698 push B406B6CFh; iretd
    Source: initial sampleStatic PE information: section name: .text entropy: 7.84240410344
    Source: initial sampleStatic PE information: section name: .text entropy: 7.84240410344
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: C:\Users\user\AppData\Roaming\XWhIIIO.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile opened: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe:Zone.Identifier read attributes | delete
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.2f5d430.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000000.00000002.341610591.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTR
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341610591.0000000003071000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341610591.0000000003071000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe TID: 3892Thread sleep time: -35577s >= -30000s
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe TID: 3556Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6448Thread sleep time: -8301034833169293s >= -30000s
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe TID: 6672Thread sleep time: -9223372036854770s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4404
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4293
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWindow / User API: threadDelayed 3184
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWindow / User API: threadDelayed 6034
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWindow / User API: foregroundWindowGot 566
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWindow / User API: foregroundWindowGot 706
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information queried: ProcessInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeThread delayed: delay time: 35577
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeThread delayed: delay time: 922337203685477
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548199204.0000000000B75000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess token adjusted: Debug
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.549490813.0000000002ED0000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.554011911.000000000713C000.00000004.00000010.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553409609.000000000682B000.00000004.00000010.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.549448120.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550031915.0000000002F72000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.549280989.0000000002DB9000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.549311521.0000000002DBB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.549950081.0000000002F5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager.M
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553715802.0000000006A6C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552854454.0000000005F4C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Managerh
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553285438.00000000066DC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552580465.0000000005AAB000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager 8
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_06920E74 GetSystemTimes,
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39dd051.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba4629.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exeString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000003.359166317.0000000000B9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550216573.0000000003971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553587766.00000000068B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553547292.0000000006890000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553237518.0000000006570000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553655349.0000000006900000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39dd051.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba4629.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Windows Management Instrumentation
    1
    Scheduled Task/Job
    12
    Process Injection
    1
    Masquerading
    11
    Input Capture
    1
    System Time Discovery
    Remote Services11
    Input Capture
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts1
    Scheduled Task/Job
    Boot or Logon Initialization Scripts1
    Scheduled Task/Job
    11
    Disable or Modify Tools
    LSASS Memory211
    Security Software Discovery
    Remote Desktop Protocol11
    Archive Collected Data
    Exfiltration Over Bluetooth1
    Non-Standard Port
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
    Virtualization/Sandbox Evasion
    Security Account Manager2
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Remote Access Software
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)12
    Process Injection
    NTDS21
    Virtualization/Sandbox Evasion
    Distributed Component Object ModelInput CaptureScheduled Transfer1
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA Secrets1
    Application Window Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Hidden Files and Directories
    Cached Domain Credentials1
    File and Directory Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items3
    Obfuscated Files or Information
    DCSync13
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
    Software Packing
    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    HOANG HA TRADING - PRODUCTS LIST.exe39%VirustotalBrowse
    HOANG HA TRADING - PRODUCTS LIST.exe42%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
    HOANG HA TRADING - PRODUCTS LIST.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\XWhIIIO.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Roaming\XWhIIIO.exe39%VirustotalBrowse
    C:\Users\user\AppData\Roaming\XWhIIIO.exe42%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
    SourceDetectionScannerLabelLinkDownload
    13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack100%AviraTR/NanoCore.fadteDownload File
    13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    62.197.136.1880%VirustotalBrowse
    62.197.136.188100%Avira URL Cloudmalware
    127.0.0.10%VirustotalBrowse
    127.0.0.10%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    62.197.136.188true
    • 0%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    127.0.0.1true
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.apache.org/licenses/LICENSE-2.0HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.fontbureau.comHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.com/designersGHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.fontbureau.com/designers/?HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.founder.com.cn/cn/bTheHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers?HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.tiro.comHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designersHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.goodfont.co.krHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://google.comHOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.carterandcone.comlHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.sajatypeworks.comHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.typography.netDHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/cabarga.htmlNHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/cTheHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.comHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/frere-jones.htmlHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/DPleaseHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers8HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fonts.comHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sandoll.co.krHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.deDPleaseHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cnHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341610591.0000000003071000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.sakkal.comHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            62.197.136.188
                            unknownNetherlands
                            1239SPRINTLINKUStrue
                            Joe Sandbox Version:34.0.0 Boulder Opal
                            Analysis ID:561384
                            Start date:27.01.2022
                            Start time:12:43:18
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 10m 36s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:HOANG HA TRADING - PRODUCTS LIST.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:18
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@11/12@0/1
                            EGA Information:
                            • Successful, ratio: 66.7%
                            HDC Information:
                            • Successful, ratio: 0.7% (good quality ratio 0.2%)
                            • Quality average: 29.6%
                            • Quality standard deviation: 40.7%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Found application associated with file extension: .exe
                            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                            • TCP Packets have been reduced to 100
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                            • Execution Graph export aborted for target HOANG HA TRADING - PRODUCTS LIST.exe, PID 6440 because there are no executed function
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            12:44:25API Interceptor771x Sleep call for process: HOANG HA TRADING - PRODUCTS LIST.exe modified
                            12:44:34API Interceptor43x Sleep call for process: powershell.exe modified
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:modified
                            Size (bytes):1216
                            Entropy (8bit):5.355304211458859
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                            MD5:FED34146BF2F2FA59DCF8702FCC8232E
                            SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                            SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                            SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                            Malicious:true
                            Reputation:high, very likely benign file
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):22392
                            Entropy (8bit):5.602882216687213
                            Encrypted:false
                            SSDEEP:384:vtCDTTuvS9LB/U3iUS0nwjultIq77Y9gxSJ3xuT1MavZlbAV7hG5ZBDI+Rzg:6L5VUTwCltlfxcECmfwwVU
                            MD5:9C89704256AD8C57C919C8F3A1917F1F
                            SHA1:C522CEAB4DF358A608BB2A76C22AFA9D27EEC6B2
                            SHA-256:6B121252553C385EF891E89523310000B4E1EBF87664C3A4FFFF640A59D9A23D
                            SHA-512:03A10C03655897BF0BC77F50400D2D378ED6D6CC4930F12102D07C8696889AD52C71F288BC464FE3054BDC77FCEE56CD195EB6EDF909EF30D8507D38763B782F
                            Malicious:false
                            Reputation:low
                            Preview:@...e...................h._...............H..........@..........H...............<@.^.L."My...:U..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview:1
                            Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1594
                            Entropy (8bit):5.147636160167977
                            Encrypted:false
                            SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtT5xvn:cge4MYrFdOFzOzN33ODOiDdKrsuTTvv
                            MD5:3467A7468FBE38A32CCD7F661AE64948
                            SHA1:3B5EC15B81BDD0B6C6F68263A4BD7B9C9630FFEA
                            SHA-256:195C8447F05F5552179030C801AC2C5FB6DFDC8850A721EF809A541B5E77BF06
                            SHA-512:FF61B32AFE5A40300CA709A603AF8397C31AF57DE832486C3AF20226CBB0827ACFC61DAF81BCF9772D91B53AF1FBBE374EC6CED2133EB116E2B0C63101A3F76D
                            Malicious:true
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                            Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):232
                            Entropy (8bit):7.024371743172393
                            Encrypted:false
                            SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                            MD5:32D0AAE13696FF7F8AF33B2D22451028
                            SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                            SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                            SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                            Malicious:false
                            Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                            Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                            File Type:ISO-8859 text, with CR line terminators
                            Category:dropped
                            Size (bytes):8
                            Entropy (8bit):3.0
                            Encrypted:false
                            SSDEEP:3:RVt:ft
                            MD5:BAE6600FA534ABB76FA969A360070C58
                            SHA1:3186B5081965D71EECFE535DD37309A2D031583E
                            SHA-256:5F2F02A0DE97B689C732B6B71CB72D7F66FA6CF63FC97BB80E9722D23CACCDE5
                            SHA-512:BED83063E01450FC57C3A4825AE872AA2EC3714DF66E0162806CF181B16314F580807EB482D236D3324E857EB4D6AD2019C923EF271D1D925E26305F0B52759D
                            Malicious:true
                            Preview:[......H
                            Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):40
                            Entropy (8bit):5.153055907333276
                            Encrypted:false
                            SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                            MD5:4E5E92E2369688041CC82EF9650EDED2
                            SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                            SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                            SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                            Malicious:false
                            Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                            Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):327432
                            Entropy (8bit):7.99938831605763
                            Encrypted:true
                            SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                            MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                            SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                            SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                            SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                            Malicious:false
                            Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                            Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):441856
                            Entropy (8bit):7.834985196744199
                            Encrypted:false
                            SSDEEP:6144:qpMFO+Q45IX8LhyTamQH7mDiZX0YIH9gCAMcKb/beI8mAWilDJC0qTs1EoHMHK/5:SXFH9gdMcMN8pJK3WMq/UOtL0eZ
                            MD5:3588F04DDBA594909215FFA819D1A655
                            SHA1:1B350C789C3882ACAC391806DBC1ECB44632A297
                            SHA-256:F35F5F2A4C1F89F26553DDB83C8DF510A492873975224DEE57E386B9FBC0795A
                            SHA-512:2AAE9F314D6A7ACD4C6607FEED54B0EA31331E5D7BD1D77C7B2F70B29646BF17CA0717C159E53548378F88289D5179188B7635C9B4E0504FD391B9206F56E45E
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: Virustotal, Detection: 39%, Browse
                            • Antivirus: ReversingLabs, Detection: 42%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....".a..............0.............b.... ........@.. ....................... ............@.....................................O.................................................................................... ............... ..H............text...h.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................D.......H.......xD.. .......Z.......@.............................................(........}......{.....{....s....}.....(.....*..0............{.....+..*&...}....*...0.............+,...+...{....... (.......X...{........-....X...{........-..{.....{.....[.Y.{.....[.Y.X(.....{.....{.....[.Y.{.....[.O(.....{.....{.....[.{.....[.Y.O(.....{.....{.....[.{.....[.X(....*..0...........s....}.....(..........(.....{.....o.........(.....{.....o.........(.....{.....o.........(.....{.....o.........(
                            Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):5777
                            Entropy (8bit):5.4161494278237505
                            Encrypted:false
                            SSDEEP:96:BZ8hUNtqDo1ZvZHhUNtqDo1Z8F3tjZchUNtqDo1ZRQddSZF:/
                            MD5:7C45F52AC1D0360FD0C66DC7621109C6
                            SHA1:AC35EF33601A39DB921BBB1D3A9D3C6E3A7974BD
                            SHA-256:E4FC8EACB1E2AC6693B72B658CC0C5D59D8F2A2F5D6D64E8FB53769C84966D7F
                            SHA-512:89A16298E90A6C7C57756483735104BDD45FDC2708A00D35D9B04741DE88620DD310CEDA7EA846D36177FAE2BA46B1C9EDFF1805665182E305386E57A384F1BB
                            Malicious:false
                            Preview:.**********************..Windows PowerShell transcript start..Start time: 20220127124434..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 284992 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\XWhIIIO.exe..Process ID: 6284..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220127124434..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\XWhIIIO.exe..**********************..Windows PowerShell transcript start..Start time: 20220127124837..Username: computer\user..RunAs User: computer\user..Con
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.834985196744199
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            • DOS Executable Generic (2002/1) 0.01%
                            File name:HOANG HA TRADING - PRODUCTS LIST.exe
                            File size:441856
                            MD5:3588f04ddba594909215ffa819d1a655
                            SHA1:1b350c789c3882acac391806dbc1ecb44632a297
                            SHA256:f35f5f2a4c1f89f26553ddb83c8df510a492873975224dee57e386b9fbc0795a
                            SHA512:2aae9f314d6a7acd4c6607feed54b0ea31331e5d7bd1d77c7b2f70b29646bf17ca0717c159e53548378f88289d5179188b7635c9b4e0504fd391b9206f56e45e
                            SSDEEP:6144:qpMFO+Q45IX8LhyTamQH7mDiZX0YIH9gCAMcKb/beI8mAWilDJC0qTs1EoHMHK/5:SXFH9gdMcMN8pJK3WMq/UOtL0eZ
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....".a..............0.............b.... ........@.. ....................... ............@................................
                            Icon Hash:00828e8e8686b000
                            Entrypoint:0x46d362
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                            Time Stamp:0x61F2228A [Thu Jan 27 04:41:46 2022 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:v4.0.30319
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x6d3100x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x6e0000x5f8.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x700000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x6d1d80x1c.text
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x6b3680x6b400False0.905489692599data7.84240410344IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                            .rsrc0x6e0000x5f80x600False0.4296875data4.20859981737IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x700000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountry
                            RT_VERSION0x6e0900x366data
                            RT_MANIFEST0x6e4080x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                            DLLImport
                            mscoree.dll_CorExeMain
                            DescriptionData
                            Translation0x0000 0x04b0
                            LegalCopyrightCopyright Overwolf 2021
                            Assembly Version11.0.0.0
                            InternalNameHashElementEnt.exe
                            FileVersion11.0.0.0
                            CompanyNameOverwolf LTD
                            LegalTrademarks
                            Comments
                            ProductNameOverwolf
                            ProductVersion11.0.0.0
                            FileDescriptionOverwolf
                            OriginalFilenameHashElementEnt.exe
                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            01/27/22-12:44:46.390279TCP2025019ET TROJAN Possible NanoCore C2 60B496914052192.168.2.362.197.136.188
                            01/27/22-12:44:52.932033TCP2025019ET TROJAN Possible NanoCore C2 60B496924052192.168.2.362.197.136.188
                            01/27/22-12:44:59.456999TCP2025019ET TROJAN Possible NanoCore C2 60B496944052192.168.2.362.197.136.188
                            01/27/22-12:45:07.015474TCP2025019ET TROJAN Possible NanoCore C2 60B496954052192.168.2.362.197.136.188
                            01/27/22-12:45:13.058509TCP2025019ET TROJAN Possible NanoCore C2 60B496964052192.168.2.362.197.136.188
                            01/27/22-12:45:19.802384TCP2025019ET TROJAN Possible NanoCore C2 60B496974052192.168.2.362.197.136.188
                            01/27/22-12:45:25.746771TCP2025019ET TROJAN Possible NanoCore C2 60B496984052192.168.2.362.197.136.188
                            01/27/22-12:45:31.854870TCP2025019ET TROJAN Possible NanoCore C2 60B496994052192.168.2.362.197.136.188
                            01/27/22-12:45:37.809917TCP2025019ET TROJAN Possible NanoCore C2 60B497004052192.168.2.362.197.136.188
                            01/27/22-12:45:43.827723TCP2025019ET TROJAN Possible NanoCore C2 60B497014052192.168.2.362.197.136.188
                            01/27/22-12:45:48.874690TCP2025019ET TROJAN Possible NanoCore C2 60B497024052192.168.2.362.197.136.188
                            01/27/22-12:45:53.922190TCP2025019ET TROJAN Possible NanoCore C2 60B497034052192.168.2.362.197.136.188
                            01/27/22-12:45:59.081946TCP2025019ET TROJAN Possible NanoCore C2 60B497044052192.168.2.362.197.136.188
                            01/27/22-12:46:05.073938TCP2025019ET TROJAN Possible NanoCore C2 60B497054052192.168.2.362.197.136.188
                            01/27/22-12:46:11.147135TCP2025019ET TROJAN Possible NanoCore C2 60B497064052192.168.2.362.197.136.188
                            01/27/22-12:46:15.825425TCP2025019ET TROJAN Possible NanoCore C2 60B497074052192.168.2.362.197.136.188
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 27, 2022 12:44:46.214098930 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:46.241147995 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:46.241326094 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:46.390279055 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:46.431857109 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:46.480118036 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:46.514540911 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:46.655117989 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:46.677963018 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:46.730134964 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.019212008 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.156794071 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.156900883 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.176754951 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.176815033 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.176856995 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.176879883 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.176894903 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.176923990 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.176932096 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.176954031 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.204154968 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.204216957 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.204261065 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.204301119 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.204317093 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.204338074 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.204377890 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.204380989 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.204417944 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.204451084 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.204458952 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.204524040 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.231389046 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.231450081 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.231487989 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.231527090 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.231535912 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.231565952 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.231605053 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.231606007 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.231647015 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.231684923 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.231689930 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.231724024 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.231756926 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.231765032 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.231803894 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.231838942 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.231844902 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.231884956 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.231916904 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.231924057 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.231965065 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.231990099 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.232003927 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.232069016 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.259080887 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259139061 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259180069 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259234905 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259273052 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259311914 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259341955 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.259356976 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259397984 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259402037 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.259408951 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.259438038 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259464025 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.259475946 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259515047 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259532928 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.259555101 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259593010 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259630919 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259633064 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.259668112 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259704113 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.259707928 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259751081 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259772062 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.259788990 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259829044 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259851933 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.259869099 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259907007 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259941101 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.259947062 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.259985924 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.260009050 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.260025024 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.260066032 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.260087967 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.260102034 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.260143042 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.260164976 CET496914052192.168.2.362.197.136.188
                            Jan 27, 2022 12:44:47.260180950 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.260221004 CET40524969162.197.136.188192.168.2.3
                            Jan 27, 2022 12:44:47.260251045 CET496914052192.168.2.362.197.136.188

                            Click to jump to process

                            Target ID:0
                            Start time:12:44:08
                            Start date:27/01/2022
                            Path:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe"
                            Imagebase:0xa60000
                            File size:441856 bytes
                            MD5 hash:3588F04DDBA594909215FFA819D1A655
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.341610591.0000000003071000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low

                            Target ID:8
                            Start time:12:44:32
                            Start date:27/01/2022
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe
                            Imagebase:0xac0000
                            File size:430592 bytes
                            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Reputation:high

                            Target ID:9
                            Start time:12:44:32
                            Start date:27/01/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7f20f0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:10
                            Start time:12:44:32
                            Start date:27/01/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp
                            Imagebase:0x1020000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:11
                            Start time:12:44:33
                            Start date:27/01/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7f20f0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:12
                            Start time:12:44:34
                            Start date:27/01/2022
                            Path:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                            Imagebase:0x350000
                            File size:441856 bytes
                            MD5 hash:3588F04DDBA594909215FFA819D1A655
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low

                            Target ID:13
                            Start time:12:44:35
                            Start date:27/01/2022
                            Path:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                            Imagebase:0x490000
                            File size:441856 bytes
                            MD5 hash:3588F04DDBA594909215FFA819D1A655
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.552454196.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.552454196.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553587766.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553587766.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553547292.0000000006890000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553547292.0000000006890000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553655349.0000000006900000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553655349.0000000006900000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553237518.0000000006570000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553237518.0000000006570000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:low

                            No disassembly