Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
remittance.exe

Overview

General Information

Sample Name:remittance.exe
Analysis ID:708238
MD5:31c5c19e5cbf0993baeef892e8f73ada
SHA1:3f39dd3802f34e7f0b8d307a5aa31daac779c3c8
SHA256:b9b9fa184afcfe0808c76a42a44a22e960d0283cf763c120be371122d0de8174
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large strings
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • remittance.exe (PID: 5568 cmdline: "C:\Users\user\Desktop\remittance.exe" MD5: 31C5C19E5CBF0993BAEEF892E8F73ADA)
    • schtasks.exe (PID: 5292 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmpAD34.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • remittance.exe (PID: 5320 cmdline: {path} MD5: 31C5C19E5CBF0993BAEEF892E8F73ADA)
      • schtasks.exe (PID: 4656 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpB828.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 1396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 2800 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpC057.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 424 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • remittance.exe (PID: 5408 cmdline: C:\Users\user\Desktop\remittance.exe 0 MD5: 31C5C19E5CBF0993BAEEF892E8F73ADA)
    • schtasks.exe (PID: 4176 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmp264C.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • remittance.exe (PID: 4656 cmdline: {path} MD5: 31C5C19E5CBF0993BAEEF892E8F73ADA)
  • dhcpmon.exe (PID: 3636 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: 31C5C19E5CBF0993BAEEF892E8F73ADA)
    • schtasks.exe (PID: 5176 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmp4136.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 5040 cmdline: {path} MD5: 31C5C19E5CBF0993BAEEF892E8F73ADA)
    • dhcpmon.exe (PID: 4712 cmdline: {path} MD5: 31C5C19E5CBF0993BAEEF892E8F73ADA)
    • dhcpmon.exe (PID: 5640 cmdline: {path} MD5: 31C5C19E5CBF0993BAEEF892E8F73ADA)
    • dhcpmon.exe (PID: 6020 cmdline: {path} MD5: 31C5C19E5CBF0993BAEEF892E8F73ADA)
  • dhcpmon.exe (PID: 1368 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 31C5C19E5CBF0993BAEEF892E8F73ADA)
    • schtasks.exe (PID: 2248 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmp5403.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 3992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 4688 cmdline: {path} MD5: 31C5C19E5CBF0993BAEEF892E8F73ADA)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "fba1bbc6-2cc8-4c94-b6c0-dda5a12f", "Group": "Default", "Domain1": "brightnano1.ddns.net", "Domain2": "", "Port": 1989, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x5b99:$x1: NanoCore.ClientPluginHost
  • 0x5bb3:$x2: IClientNetworkHost
00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x5b99:$x2: NanoCore.ClientPluginHost
  • 0x6bce:$s4: PipeCreated
  • 0x5b86:$s5: IClientLoggingHost
00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x5b70:$x2: NanoCore.ClientPlugin
  • 0x5b99:$x3: NanoCore.ClientPluginHost
  • 0x5b61:$i3: IClientNetwork
  • 0x5b86:$i6: IClientLoggingHost
  • 0x5bb3:$i7: IClientNetworkHost
  • 0x59d4:$s1: ClientPlugin
  • 0x5b79:$s1: ClientPlugin
  • 0x5e84:$s2: EndPoint
  • 0x5e8d:$s3: IPAddress
  • 0x5e97:$s4: IPEndPoint
00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x5b99:$a1: NanoCore.ClientPluginHost
  • 0x5b70:$a2: NanoCore.ClientPlugin
  • 0x5b86:$b9: IClientLoggingHost
00000004.00000003.322686052.00000000063EB000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x1ad4:$a1: NanoCore.ClientPluginHost
  • 0x1aaf:$a2: NanoCore.ClientPlugin
  • 0x1ac5:$b4: IClientAppHost
  • 0x5fb4:$b7: LogClientException
  • 0x1afe:$b9: IClientLoggingHost
Click to see the 105 entries
SourceRuleDescriptionAuthorStrings
4.2.remittance.exe.2b4689c.1.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x2dbb:$x1: NanoCore.ClientPluginHost
  • 0x2de5:$x2: IClientNetworkHost
4.2.remittance.exe.2b4689c.1.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x2dbb:$x2: NanoCore.ClientPluginHost
  • 0x4c6b:$s4: PipeCreated
4.2.remittance.exe.2b4689c.1.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x2d96:$x2: NanoCore.ClientPlugin
  • 0x2dbb:$x3: NanoCore.ClientPluginHost
  • 0x2d87:$i3: IClientNetwork
  • 0x2dac:$i4: IClientAppHost
  • 0x2dd5:$i5: IClientDataHost
  • 0x2de5:$i7: IClientNetworkHost
  • 0x2df8:$i9: IClientNameObjectCollection
  • 0x2e1d:$i10: IClientReadOnlyNameObjectCollection
  • 0x2bce:$s1: ClientPlugin
  • 0x2d9f:$s1: ClientPlugin
4.2.remittance.exe.2b4689c.1.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x2dbb:$a1: NanoCore.ClientPluginHost
  • 0x2d96:$a2: NanoCore.ClientPlugin
  • 0x6758:$b1: get_BuilderSettings
  • 0x2dac:$b4: IClientAppHost
4.2.remittance.exe.5f20000.22.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x170b:$x1: NanoCore.ClientPluginHost
  • 0x1725:$x2: IClientNetworkHost
Click to see the 268 entries

AV Detection

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\remittance.exe, ProcessId: 5320, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

E-Banking Fraud

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\remittance.exe, ProcessId: 5320, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Persistence and Installation Behavior

barindex
Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmpAD34.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmpAD34.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\remittance.exe" , ParentImage: C:\Users\user\Desktop\remittance.exe, ParentProcessId: 5568, ParentProcessName: remittance.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmpAD34.tmp, ProcessId: 5292, ProcessName: schtasks.exe

Stealing of Sensitive Information

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\remittance.exe, ProcessId: 5320, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Remote Access Functionality

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\remittance.exe, ProcessId: 5320, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Timestamp:171.22.30.97192.168.2.71989497052810290 09/23/22-07:56:53.827103
SID:2810290
Source Port:1989
Destination Port:49705
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.7171.22.30.974971119892816766 09/23/22-07:57:41.247890
SID:2816766
Source Port:49711
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.7171.22.30.974970619892816766 09/23/22-07:57:06.725139
SID:2816766
Source Port:49706
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:171.22.30.97192.168.2.71989497132841753 09/23/22-07:58:14.093577
SID:2841753
Source Port:1989
Destination Port:49713
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:171.22.30.97192.168.2.71989497052841753 09/23/22-07:56:53.710839
SID:2841753
Source Port:1989
Destination Port:49705
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.7171.22.30.974970819892816766 09/23/22-07:57:20.810472
SID:2816766
Source Port:49708
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:171.22.30.97192.168.2.71989497092841753 09/23/22-07:57:29.506018
SID:2841753
Source Port:1989
Destination Port:49709
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.7171.22.30.974970419892816766 09/23/22-07:56:47.366861
SID:2816766
Source Port:49704
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.7171.22.30.974970219892816766 09/23/22-07:56:26.749349
SID:2816766
Source Port:49702
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.7171.22.30.974970719892816766 09/23/22-07:57:12.636515
SID:2816766
Source Port:49707
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.7171.22.30.974971019892816766 09/23/22-07:57:35.334869
SID:2816766
Source Port:49710
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.7171.22.30.974971219892816766 09/23/22-07:57:47.430003
SID:2816766
Source Port:49712
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:171.22.30.97192.168.2.71989497112841753 09/23/22-07:57:41.521548
SID:2841753
Source Port:1989
Destination Port:49711
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:171.22.30.97192.168.2.71989497102841753 09/23/22-07:57:35.595884
SID:2841753
Source Port:1989
Destination Port:49710
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.7171.22.30.974970819892816718 09/23/22-07:57:19.224935
SID:2816718
Source Port:49708
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.7171.22.30.974970319892816766 09/23/22-07:56:33.758479
SID:2816766
Source Port:49703
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: remittance.exeVirustotal: Detection: 25%Perma Link
Source: brightnano1.ddns.netAvira URL Cloud: Label: malware
Source: brightnano1.ddns.netVirustotal: Detection: 11%Perma Link
Source: Yara matchFile source: 4.0.remittance.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.445060c.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.4454c35.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.6184629.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.6180000.24.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.445060c.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.6180000.24.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.remittance.exe.3cff4d0.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.3c60a62.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.444b7d6.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.3c4c435.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.3c40201.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.remittance.exe.3cff4d0.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000002.523139135.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000016.00000002.414806118.0000000003401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000000.290583986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001E.00000002.446559269.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: remittance.exe PID: 5568, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: remittance.exe PID: 5320, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: remittance.exe PID: 4656, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4688, type: MEMORYSTR
Source: remittance.exeJoe Sandbox ML: detected
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\QgSBwlYTdt.exeJoe Sandbox ML: detected
Source: 4.0.remittance.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 4.2.remittance.exe.6180000.24.unpackAvira: Label: TR/NanoCore.fadte
Source: 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "fba1bbc6-2cc8-4c94-b6c0-dda5a12f", "Group": "Default", "Domain1": "brightnano1.ddns.net", "Domain2": "", "Port": 1989, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
Source: remittance.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: remittance.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Windows\dll\System.pdbtem.pdb source: remittance.exe, 00000004.00000003.449519283.00000000064B1000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: to22csv.pdb source: remittance.exe, dhcpmon.exe.4.dr, QgSBwlYTdt.exe.0.dr
Source: Binary string: to22csv.pdbSHA256 source: remittance.exe, dhcpmon.exe.4.dr, QgSBwlYTdt.exe.0.dr
Source: Binary string: dows\exe\to22csv.pdb source: remittance.exe, 00000004.00000002.518867540.0000000000E58000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.552120650.0000000006F80000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: remittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdbc source: remittance.exe, 00000004.00000003.449519283.00000000064B1000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: remittance.exe, 00000004.00000003.449519283.00000000064B1000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: remittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: System.pdb source: remittance.exe, 00000004.00000003.449888170.00000000064C4000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000003.458177264.00000000064C4000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\remittance.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_0666BBF0

Networking

barindex
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49702 -> 171.22.30.97:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49703 -> 171.22.30.97:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49704 -> 171.22.30.97:1989
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 171.22.30.97:1989 -> 192.168.2.7:49705
Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 171.22.30.97:1989 -> 192.168.2.7:49705
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49706 -> 171.22.30.97:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49707 -> 171.22.30.97:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49708 -> 171.22.30.97:1989
Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.7:49708 -> 171.22.30.97:1989
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 171.22.30.97:1989 -> 192.168.2.7:49709
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49710 -> 171.22.30.97:1989
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 171.22.30.97:1989 -> 192.168.2.7:49710
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49711 -> 171.22.30.97:1989
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 171.22.30.97:1989 -> 192.168.2.7:49711
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49712 -> 171.22.30.97:1989
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 171.22.30.97:1989 -> 192.168.2.7:49713
Source: Malware configuration extractorURLs:
Source: Malware configuration extractorURLs: brightnano1.ddns.net
Source: unknownDNS query: name: brightnano1.ddns.net
Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
Source: global trafficTCP traffic: 192.168.2.7:49702 -> 171.22.30.97:1989
Source: remittance.exe, 00000000.00000003.254099244.000000000594D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254127821.000000000594D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.wikipedia(
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
Source: remittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://google.com
Source: remittance.exe, 00000000.00000002.295989192.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.523139135.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000010.00000002.377885898.00000000032AD000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000012.00000002.410525725.0000000002AC8000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000013.00000002.404695909.0000000002A11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254757127.000000000594F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: remittance.exe, 00000000.00000003.255212778.0000000005951000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255284729.0000000005951000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255421189.0000000005951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
Source: remittance.exe, 00000000.00000003.255212778.0000000005951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comNS
Source: remittance.exe, 00000000.00000003.255212778.0000000005951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTC
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: remittance.exe, 00000000.00000003.255421189.0000000005951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.
Source: remittance.exe, 00000000.00000003.255212778.0000000005951000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255284729.0000000005951000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255421189.0000000005951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coms0%;
Source: remittance.exe, 00000000.00000003.255212778.0000000005951000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255284729.0000000005951000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255421189.0000000005951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comue
Source: remittance.exe, 00000000.00000003.260376505.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.260046920.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
Source: remittance.exe, 00000000.00000003.260376505.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.260046920.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com.TTF
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: remittance.exe, 00000000.00000003.260376505.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.260046920.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
Source: remittance.exe, 00000000.00000003.293674688.0000000005920000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
Source: remittance.exe, 00000000.00000003.260376505.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.260572463.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.260046920.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalic
Source: remittance.exe, 00000000.00000003.293674688.0000000005920000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comld
Source: remittance.exe, 00000000.00000003.260376505.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.260046920.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsivaO
Source: remittance.exe, 00000000.00000003.251831584.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.251901759.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254537231.000000000594F000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.252868092.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254144082.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.252443291.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254376366.000000000594F000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.251866759.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.252685408.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.252259158.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.253977771.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254109489.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.252232497.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.252389352.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.251996989.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.251682033.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.253103524.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.252176157.0000000005955000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
Source: remittance.exe, 00000000.00000003.251840471.000000000106C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comion
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: remittance.exe, 00000000.00000003.254920591.0000000005952000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254537231.000000000594F000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254844773.0000000005950000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254376366.000000000594F000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254910360.000000000594F000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254757127.000000000594F000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.253346124.000000000592E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: remittance.exe, 00000000.00000003.253900998.000000000594D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.253988482.000000000594D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cncom
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: remittance.exe, 00000000.00000003.253346124.000000000592E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.krl
Source: remittance.exe, 00000000.00000003.253346124.000000000592E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.krmk
Source: remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.257020488.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255721208.0000000005923000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256827860.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256068123.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/#
Source: remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/(
Source: remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//
Source: remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255721208.0000000005923000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256068123.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/6
Source: remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255721208.0000000005923000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256068123.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/:
Source: remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.257020488.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256827860.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.257090388.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/F
Source: remittance.exe, 00000000.00000003.257020488.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256827860.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Kurs
Source: remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256068123.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/P
Source: remittance.exe, 00000000.00000003.256068123.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y
Source: remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0lk
Source: remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256068123.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/el
Source: remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/es-e
Source: remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.257020488.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256827860.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
Source: remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/k
Source: remittance.exe, 00000000.00000003.257020488.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256827860.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/u
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
Source: remittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com0
Source: remittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.comP
Source: remittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.comd
Source: remittance.exe, 00000000.00000003.253346124.000000000592E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: remittance.exe, 00000000.00000003.253346124.000000000592E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kro.krcr
Source: remittance.exe, 00000000.00000003.253346124.000000000592E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krt-it-h
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
Source: remittance.exe, 00000000.00000003.254563663.000000000106C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com~Z
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
Source: remittance.exe, 00000000.00000003.260046920.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
Source: remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: remittance.exe, 00000000.00000003.260046920.0000000005932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deom
Source: remittance.exe, 00000000.00000003.254920591.0000000005952000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254844773.0000000005950000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254910360.000000000594F000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: remittance.exe, 00000000.00000003.254920591.0000000005952000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254910360.000000000594F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnT
Source: remittance.exe, 00000000.00000003.254910360.000000000594F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.
Source: unknownDNS traffic detected: queries for: brightnano1.ddns.net
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

E-Banking Fraud

barindex
Source: Yara matchFile source: 4.0.remittance.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.445060c.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.4454c35.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.6184629.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.6180000.24.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.445060c.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.6180000.24.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.remittance.exe.3cff4d0.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.3c60a62.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.444b7d6.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.3c4c435.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.3c40201.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.remittance.exe.3cff4d0.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000002.523139135.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000016.00000002.414806118.0000000003401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000000.290583986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001E.00000002.446559269.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: remittance.exe PID: 5568, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: remittance.exe PID: 5320, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: remittance.exe PID: 4656, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4688, type: MEMORYSTR

System Summary

barindex
Source: 4.2.remittance.exe.2b4689c.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.2b4689c.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.2b4689c.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.5f20000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.5f20000.22.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.5f20000.22.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.0.remittance.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.0.remittance.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.0.remittance.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 4.0.remittance.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.2b13720.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.2b13720.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.2b13720.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.6f40000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.6f40000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.6f40000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.70d0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.70d0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.70d0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.5ee0000.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.5ee0000.19.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.5ee0000.19.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.6f80000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.6f80000.30.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.6f80000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 22.2.remittance.exe.445060c.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 22.2.remittance.exe.445060c.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 22.2.remittance.exe.445060c.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.7160000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.7160000.34.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.7160000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 22.2.remittance.exe.4454c35.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 22.2.remittance.exe.4454c35.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 22.2.remittance.exe.4454c35.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.6184629.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.6184629.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.6184629.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.5ef0000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.5ef0000.20.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.5ef0000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.716e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.716e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.716e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.5f40000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.5f40000.23.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.5f40000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.2b52b18.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.2b52b18.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.2b52b18.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.6f30000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.6f30000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.6f30000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.55b0000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.55b0000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.55b0000.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.6180000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.6180000.24.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.6180000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 22.2.remittance.exe.445060c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 22.2.remittance.exe.445060c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 22.2.remittance.exe.445060c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.5f40000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.5f40000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.5f40000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3e13c2e.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3e13c2e.15.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3e13c2e.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.5f00000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.5f00000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.5f00000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3d0aace.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3d0aace.13.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3d0aace.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3c4c435.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3c4c435.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3c4c435.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.7164c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.7164c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.7164c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3c40201.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3c40201.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3c40201.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.6180000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.6180000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.6180000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.6f70000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.6f70000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.6f70000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.5ee0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.5ee0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.5ee0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.remittance.exe.3cff4d0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.remittance.exe.3cff4d0.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.remittance.exe.3cff4d0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.remittance.exe.3cff4d0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3e2205e.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3e2205e.16.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3e2205e.16.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.5f20000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.5f20000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.5f20000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3ad81d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3ad81d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3ad81d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.70d0000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.70d0000.31.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.70d0000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.2b4689c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.2b4689c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.2b4689c.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 4.2.remittance.exe.2b4689c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.7160000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.7160000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.7160000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3c60a62.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3c60a62.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3c60a62.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 4.2.remittance.exe.3c60a62.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3d24b25.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3d24b25.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3d24b25.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.2b52b18.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.2b52b18.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.2b52b18.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 4.2.remittance.exe.2b52b18.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3e0adff.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3e0adff.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3e0adff.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3ac9930.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3ac9930.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3ac9930.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.6f30000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.6f30000.27.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.6f30000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3ace5cf.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3ace5cf.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3ace5cf.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3ac9930.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3ac9930.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3ac9930.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3d0aace.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3d0aace.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3d0aace.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 4.2.remittance.exe.3d0aace.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.5f00000.21.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.5f00000.21.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.5f00000.21.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 30.2.dhcpmon.exe.31a9660.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 30.2.dhcpmon.exe.31a9660.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 30.2.dhcpmon.exe.31a9660.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.5ed0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.5ed0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.5ed0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.6f40000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.6f40000.28.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.6f40000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.2b67188.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.2b67188.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.2b67188.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 4.2.remittance.exe.2b67188.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.6f80000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.6f80000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.6f80000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.5ef0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 22.2.remittance.exe.444b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3c4c435.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3d24b25.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3e0adff.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3d1f0f9.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 22.2.remittance.exe.34695a8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 22.2.remittance.exe.34695a8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 22.2.remittance.exe.34695a8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3c40201.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3e13c2e.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3d24b25.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3d24b25.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 4.2.remittance.exe.3d24b25.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3d1f0f9.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3d1f0f9.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 4.2.remittance.exe.3d1f0f9.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3c4c435.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3c4c435.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 4.2.remittance.exe.3c4c435.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3e13c2e.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3e13c2e.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.5ef0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.5ef0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 22.2.remittance.exe.444b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 22.2.remittance.exe.444b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 22.2.remittance.exe.444b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3e2205e.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.remittance.exe.3e0adff.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3e0adff.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 4.2.remittance.exe.3e0adff.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3e2205e.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3c40201.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 4.2.remittance.exe.3c40201.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 4.2.remittance.exe.3c40201.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 4.2.remittance.exe.3e2205e.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.remittance.exe.3cff4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.remittance.exe.3cff4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.remittance.exe.3cff4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.remittance.exe.3cff4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000003.322686052.00000000063EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.551697216.0000000006F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.551697216.0000000006F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000004.00000002.551697216.0000000006F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.546662397.00000000055B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.546662397.00000000055B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000004.00000002.546662397.00000000055B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.523139135.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000016.00000002.414806118.0000000003401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000016.00000002.414806118.0000000003401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.551554712.0000000006F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.551554712.0000000006F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000004.00000002.551554712.0000000006F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000000.290583986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000000.290583986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000004.00000000.290583986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.552340856.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.552340856.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000004.00000002.552340856.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.552120650.0000000006F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.552120650.0000000006F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000004.00000002.552120650.0000000006F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.547605387.0000000005F20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.547605387.0000000005F20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000004.00000002.547605387.0000000005F20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.547869881.0000000005F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.547869881.0000000005F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000004.00000002.547869881.0000000005F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000004.00000002.535725850.0000000003AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000001E.00000002.446559269.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000001E.00000002.446559269.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: remittance.exe PID: 5568, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: remittance.exe PID: 5568, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: remittance.exe PID: 5568, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: remittance.exe PID: 5320, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: remittance.exe PID: 5320, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: remittance.exe PID: 5320, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: remittance.exe PID: 4656, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: remittance.exe PID: 4656, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: dhcpmon.exe PID: 4688, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: dhcpmon.exe PID: 4688, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: remittance.exe, AnswerWindow_Form.csLong String: Length: 129663
Source: QgSBwlYTdt.exe.0.dr, AnswerWindow_Form.csLong String: Length: 129663
Source: 0.0.remittance.exe.520000.0.unpack, AnswerWindow_Form.csLong String: Length: 129663
Source: dhcpmon.exe.4.dr, AnswerWindow_Form.csLong String: Length: 129663
Source: remittance.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 4.2.remittance.exe.2b4689c.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.2b4689c.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.2b4689c.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.2b4689c.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.5f20000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5f20000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5f20000.22.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.5f20000.22.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.0.remittance.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.0.remittance.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.0.remittance.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.0.remittance.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 4.0.remittance.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.2b13720.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.2b13720.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.2b13720.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.2b13720.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.6f40000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6f40000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6f40000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.6f40000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.70d0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.70d0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.70d0000.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.70d0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.5ee0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5ee0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5ee0000.19.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.5ee0000.19.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.6f80000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6f80000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6f80000.30.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.6f80000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 22.2.remittance.exe.445060c.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 22.2.remittance.exe.445060c.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 22.2.remittance.exe.445060c.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 22.2.remittance.exe.445060c.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.7160000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.7160000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.7160000.34.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.7160000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 22.2.remittance.exe.4454c35.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 22.2.remittance.exe.4454c35.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 22.2.remittance.exe.4454c35.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 22.2.remittance.exe.4454c35.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.6184629.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6184629.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6184629.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.6184629.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.5ef0000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5ef0000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5ef0000.20.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.5ef0000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.716e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.716e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.716e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.716e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.5f40000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5f40000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5f40000.23.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.5f40000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.2b52b18.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.2b52b18.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.2b52b18.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.2b52b18.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.6f30000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6f30000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6f30000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.6f30000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.55b0000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.55b0000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.55b0000.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.55b0000.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.6180000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6180000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6180000.24.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.6180000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 22.2.remittance.exe.445060c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 22.2.remittance.exe.445060c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 22.2.remittance.exe.445060c.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 22.2.remittance.exe.445060c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.5f40000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5f40000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5f40000.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.5f40000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3e13c2e.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3e13c2e.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3e13c2e.15.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3e13c2e.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.5f00000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5f00000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5f00000.21.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.5f00000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3d0aace.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3d0aace.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3d0aace.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3d0aace.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3c4c435.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3c4c435.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3c4c435.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3c4c435.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.7164c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.7164c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.7164c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.7164c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3c40201.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3c40201.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3c40201.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3c40201.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.6180000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6180000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6180000.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.6180000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.6f70000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6f70000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6f70000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.6f70000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.5ee0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5ee0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5ee0000.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.5ee0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.remittance.exe.3cff4d0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.remittance.exe.3cff4d0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.remittance.exe.3cff4d0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.remittance.exe.3cff4d0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.remittance.exe.3cff4d0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3e2205e.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3e2205e.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3e2205e.16.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3e2205e.16.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.5f20000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5f20000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5f20000.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.5f20000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3ad81d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3ad81d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3ad81d4.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3ad81d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.70d0000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.70d0000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.70d0000.31.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.70d0000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.2b4689c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.2b4689c.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.2b4689c.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 4.2.remittance.exe.2b4689c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.7160000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.7160000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.7160000.34.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.7160000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3c60a62.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3c60a62.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3c60a62.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 4.2.remittance.exe.3c60a62.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3d24b25.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3d24b25.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3d24b25.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3d24b25.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.2b52b18.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.2b52b18.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.2b52b18.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.2b52b18.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 4.2.remittance.exe.2b52b18.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3e0adff.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3e0adff.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3e0adff.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3e0adff.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3ac9930.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3ac9930.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3ac9930.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3ac9930.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.6f30000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6f30000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6f30000.27.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.6f30000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3ace5cf.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3ace5cf.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3ace5cf.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3ace5cf.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3ac9930.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3ac9930.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3ac9930.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3ac9930.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3d0aace.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3d0aace.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3d0aace.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 4.2.remittance.exe.3d0aace.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.5f00000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5f00000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5f00000.21.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.5f00000.21.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 30.2.dhcpmon.exe.31a9660.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 30.2.dhcpmon.exe.31a9660.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 30.2.dhcpmon.exe.31a9660.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 30.2.dhcpmon.exe.31a9660.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.5ed0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5ed0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5ed0000.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.5ed0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.6f40000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6f40000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6f40000.28.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.6f40000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.2b67188.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.2b67188.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.2b67188.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.2b67188.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 4.2.remittance.exe.2b67188.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.6f80000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6f80000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.6f80000.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.6f80000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.5ef0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.5ef0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 22.2.remittance.exe.444b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 22.2.remittance.exe.444b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3c4c435.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3d24b25.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3d24b25.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3e0adff.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3e0adff.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3d1f0f9.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3d1f0f9.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 22.2.remittance.exe.34695a8.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 22.2.remittance.exe.34695a8.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 22.2.remittance.exe.34695a8.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 22.2.remittance.exe.34695a8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3c40201.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3e13c2e.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3e13c2e.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3d24b25.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3d24b25.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 4.2.remittance.exe.3d24b25.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3d1f0f9.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3d1f0f9.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 4.2.remittance.exe.3d1f0f9.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3c4c435.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3c4c435.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 4.2.remittance.exe.3c4c435.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3e13c2e.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3e13c2e.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.5ef0000.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.5ef0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 22.2.remittance.exe.444b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 22.2.remittance.exe.444b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 22.2.remittance.exe.444b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3e2205e.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3e2205e.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.remittance.exe.3e0adff.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3e0adff.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 4.2.remittance.exe.3e0adff.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3e2205e.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3c40201.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 4.2.remittance.exe.3c40201.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 4.2.remittance.exe.3c40201.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 4.2.remittance.exe.3e2205e.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.remittance.exe.3cff4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.remittance.exe.3cff4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.remittance.exe.3cff4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.remittance.exe.3cff4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000003.322686052.00000000063EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.551697216.0000000006F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.551697216.0000000006F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.551697216.0000000006F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000004.00000002.551697216.0000000006F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.546662397.00000000055B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.546662397.00000000055B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.546662397.00000000055B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000004.00000002.546662397.00000000055B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.523139135.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000016.00000002.414806118.0000000003401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000016.00000002.414806118.0000000003401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.551554712.0000000006F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.551554712.0000000006F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.551554712.0000000006F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000004.00000002.551554712.0000000006F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000000.290583986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000000.290583986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000004.00000000.290583986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.552340856.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.552340856.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.552340856.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000004.00000002.552340856.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.552120650.0000000006F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.552120650.0000000006F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.552120650.0000000006F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000004.00000002.552120650.0000000006F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.547605387.0000000005F20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.547605387.0000000005F20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.547605387.0000000005F20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000004.00000002.547605387.0000000005F20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.547869881.0000000005F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.547869881.0000000005F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.547869881.0000000005F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000004.00000002.547869881.0000000005F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000004.00000002.535725850.0000000003AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000001E.00000002.446559269.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000001E.00000002.446559269.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: remittance.exe PID: 5568, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: remittance.exe PID: 5568, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: remittance.exe PID: 5568, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: remittance.exe PID: 5568, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: remittance.exe PID: 5320, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: remittance.exe PID: 5320, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: remittance.exe PID: 5320, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: remittance.exe PID: 5408, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: dhcpmon.exe PID: 3636, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: dhcpmon.exe PID: 1368, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: remittance.exe PID: 4656, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: remittance.exe PID: 4656, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: dhcpmon.exe PID: 4688, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: dhcpmon.exe PID: 4688, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: C:\Users\user\Desktop\remittance.exeCode function: 0_2_04DFE7100_2_04DFE710
Source: C:\Users\user\Desktop\remittance.exeCode function: 0_2_04DFE7200_2_04DFE720
Source: C:\Users\user\Desktop\remittance.exeCode function: 4_2_02AAE4804_2_02AAE480
Source: C:\Users\user\Desktop\remittance.exeCode function: 4_2_02AAE4714_2_02AAE471
Source: C:\Users\user\Desktop\remittance.exeCode function: 4_2_02AABBD44_2_02AABBD4
Source: C:\Users\user\Desktop\remittance.exeCode function: 4_2_066600404_2_06660040
Source: C:\Users\user\Desktop\remittance.exeCode function: 4_2_06669CD84_2_06669CD8
Source: C:\Users\user\Desktop\remittance.exeCode function: 4_2_06668D884_2_06668D88
Source: C:\Users\user\Desktop\remittance.exeCode function: 4_2_066699A04_2_066699A0
Source: remittance.exe, 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameto22csv.exeX vs remittance.exe
Source: remittance.exe, 00000000.00000002.299394579.00000000039A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs remittance.exe
Source: remittance.exe, 00000000.00000002.306847093.0000000007330000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs remittance.exe
Source: remittance.exe, 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs remittance.exe
Source: remittance.exe, 00000000.00000000.243162309.0000000000522000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameto22csv.exeX vs remittance.exe
Source: remittance.exe, 00000000.00000002.306716234.00000000070F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs remittance.exe
Source: remittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs remittance.exe
Source: remittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs remittance.exe
Source: remittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.523139135.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000003.322686052.00000000063EB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs remittance.exe
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs remittance.exe
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs remittance.exe
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs remittance.exe
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs remittance.exe
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.551697216.0000000006F40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs remittance.exe
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs remittance.exe
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs remittance.exe
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs remittance.exe
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs remittance.exe
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs remittance.exe
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.547994695.0000000005F4E000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs remittance.exe
Source: remittance.exe, 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs remittance.exe
Source: remittance.exe, 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.551662858.0000000006F3B000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs remittance.exe
Source: remittance.exe, 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs remittance.exe
Source: remittance.exe, 00000004.00000002.552340856.0000000007160000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.552340856.0000000007160000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.552120650.0000000006F80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.547605387.0000000005F20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.551031060.0000000006630000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.535725850.0000000003AC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.535725850.0000000003AC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.535725850.0000000003AC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000004.00000002.552777732.0000000007188000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs remittance.exe
Source: remittance.exe, 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000016.00000002.414806118.0000000003401000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs remittance.exe
Source: remittance.exe, 00000016.00000002.414806118.0000000003401000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs remittance.exe
Source: remittance.exeBinary or memory string: OriginalFilenameto22csv.exeX vs remittance.exe
Source: remittance.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: QgSBwlYTdt.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: dhcpmon.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: remittance.exeVirustotal: Detection: 25%
Source: C:\Users\user\Desktop\remittance.exeFile read: C:\Users\user\Desktop\remittance.exeJump to behavior
Source: remittance.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\remittance.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\remittance.exe "C:\Users\user\Desktop\remittance.exe"
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmpAD34.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Users\user\Desktop\remittance.exe {path}
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpB828.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpC057.tmp
Source: unknownProcess created: C:\Users\user\Desktop\remittance.exe C:\Users\user\Desktop\remittance.exe 0
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmp264C.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Users\user\Desktop\remittance.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmp4136.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmp5403.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmpAD34.tmpJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Users\user\Desktop\remittance.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpB828.tmpJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpC057.tmpJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmp264C.tmpJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Users\user\Desktop\remittance.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmp4136.tmpJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmp5403.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Users\user\Desktop\remittance.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\remittance.exeFile created: C:\Users\user\AppData\Roaming\QgSBwlYTdt.exeJump to behavior
Source: C:\Users\user\Desktop\remittance.exeFile created: C:\Users\user\AppData\Local\Temp\tmpAD34.tmpJump to behavior
Source: classification engineClassification label: mal100.troj.evad.winEXE@36/17@12/1
Source: C:\Users\user\Desktop\remittance.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: remittance.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
Source: C:\Users\user\Desktop\remittance.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\remittance.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\remittance.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\remittance.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5268:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3992:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5264:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:424:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1396:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2880:120:WilError_01
Source: C:\Users\user\Desktop\remittance.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{fba1bbc6-2cc8-4c94-b6c0-dda5a12fd7fe}
Source: C:\Users\user\Desktop\remittance.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
Source: 4.0.remittance.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 4.0.remittance.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 4.0.remittance.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\remittance.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: remittance.exeStatic file information: File size 1066496 > 1048576
Source: remittance.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: remittance.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: remittance.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Windows\dll\System.pdbtem.pdb source: remittance.exe, 00000004.00000003.449519283.00000000064B1000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: to22csv.pdb source: remittance.exe, dhcpmon.exe.4.dr, QgSBwlYTdt.exe.0.dr
Source: Binary string: to22csv.pdbSHA256 source: remittance.exe, dhcpmon.exe.4.dr, QgSBwlYTdt.exe.0.dr
Source: Binary string: dows\exe\to22csv.pdb source: remittance.exe, 00000004.00000002.518867540.0000000000E58000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.552120650.0000000006F80000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: remittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdbc source: remittance.exe, 00000004.00000003.449519283.00000000064B1000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: remittance.exe, 00000004.00000003.449519283.00000000064B1000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: remittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: System.pdb source: remittance.exe, 00000004.00000003.449888170.00000000064C4000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000003.458177264.00000000064C4000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: 4.0.remittance.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 4.0.remittance.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Users\user\Desktop\remittance.exeCode function: 0_2_04DF6F1F push 9000005Eh; ret 0_2_04DF6F29
Source: C:\Users\user\Desktop\remittance.exeCode function: 4_2_0666D46A push es; retf 4_2_0666D471
Source: C:\Users\user\Desktop\remittance.exeCode function: 4_2_0666C240 pushad ; ret 4_2_0666C241
Source: 4.0.remittance.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 4.0.remittance.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: C:\Users\user\Desktop\remittance.exeFile created: C:\Users\user\AppData\Roaming\QgSBwlYTdt.exeJump to dropped file
Source: C:\Users\user\Desktop\remittance.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmpAD34.tmp

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\remittance.exeFile opened: C:\Users\user\Desktop\remittance.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\remittance.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: Yara matchFile source: Process Memory Space: remittance.exe PID: 5568, type: MEMORYSTR
Source: remittance.exe, 00000000.00000002.295989192.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000010.00000002.378421221.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000012.00000002.410787793.0000000002AD0000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000013.00000002.404695909.0000000002A11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
Source: remittance.exe, 00000000.00000002.295989192.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000010.00000002.378421221.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000012.00000002.410787793.0000000002AD0000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000013.00000002.404695909.0000000002A11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Users\user\Desktop\remittance.exe TID: 5544Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\remittance.exe TID: 5240Thread sleep time: -10145709240540247s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\remittance.exe TID: 4488Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2884Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5616Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\remittance.exe TID: 5168Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2236Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1300Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\remittance.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\remittance.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\remittance.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\remittance.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\remittance.exeWindow / User API: threadDelayed 9412Jump to behavior
Source: C:\Users\user\Desktop\remittance.exeWindow / User API: foregroundWindowGot 402Jump to behavior
Source: C:\Users\user\Desktop\remittance.exeWindow / User API: foregroundWindowGot 460Jump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\remittance.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\remittance.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\remittance.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: dhcpmon.exe, 00000013.00000002.404695909.0000000002A11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
Source: dhcpmon.exe, 00000013.00000002.404695909.0000000002A11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
Source: dhcpmon.exe, 00000013.00000002.404695909.0000000002A11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: dhcpmon.exe, 00000013.00000002.404695909.0000000002A11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: dhcpmon.exe, 00000013.00000002.404695909.0000000002A11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
Source: dhcpmon.exe, 00000013.00000002.404695909.0000000002A11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: dhcpmon.exe, 00000013.00000002.404695909.0000000002A11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
Source: dhcpmon.exe, 00000013.00000002.404695909.0000000002A11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
Source: dhcpmon.exe, 00000013.00000002.404695909.0000000002A11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
Source: remittance.exe, 00000004.00000002.520237997.0000000000EA0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\remittance.exeProcess token adjusted: DebugJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\remittance.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\remittance.exeMemory written: C:\Users\user\Desktop\remittance.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\remittance.exeMemory written: C:\Users\user\Desktop\remittance.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmpAD34.tmpJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Users\user\Desktop\remittance.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpB828.tmpJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpC057.tmpJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmp264C.tmpJump to behavior
Source: C:\Users\user\Desktop\remittance.exeProcess created: C:\Users\user\Desktop\remittance.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmp4136.tmpJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmp5403.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: remittance.exe, 00000004.00000002.535636641.000000000308C000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.534087589.0000000002FAE000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.528988737.0000000002D08000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: remittance.exe, 00000004.00000002.550978550.000000000662C000.00000004.00000010.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.553174217.0000000007E4B000.00000004.00000010.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.553289607.000000000840B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
Source: remittance.exe, 00000004.00000002.526719540.0000000002BE2000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.532799849.0000000002EF4000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.527747557.0000000002C62000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerp
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Users\user\Desktop\remittance.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Users\user\Desktop\remittance.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Users\user\Desktop\remittance.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Users\user\Desktop\remittance.exe VolumeInformation
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\Desktop\remittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\remittance.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\remittance.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

Stealing of Sensitive Information

barindex
Source: Yara matchFile source: 4.0.remittance.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.445060c.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.4454c35.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.6184629.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.6180000.24.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.445060c.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.6180000.24.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.remittance.exe.3cff4d0.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.3c60a62.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.444b7d6.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.3c4c435.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.3c40201.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.remittance.exe.3cff4d0.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000002.523139135.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000016.00000002.414806118.0000000003401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000000.290583986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001E.00000002.446559269.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: remittance.exe PID: 5568, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: remittance.exe PID: 5320, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: remittance.exe PID: 4656, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4688, type: MEMORYSTR

Remote Access Functionality

barindex
Source: remittance.exe, 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: remittance.exe, 00000004.00000002.523139135.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.523139135.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: remittance.exe, 00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000003.322686052.00000000063EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: remittance.exe, 00000004.00000002.551697216.0000000006F40000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: remittance.exe, 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: remittance.exe, 00000004.00000002.551554712.0000000006F30000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: remittance.exe, 00000004.00000000.290583986.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: remittance.exe, 00000004.00000002.552340856.0000000007160000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.552120650.0000000006F80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.547605387.0000000005F20000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.547869881.0000000005F40000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000004.00000002.535725850.0000000003AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: remittance.exe, 00000016.00000002.414806118.0000000003401000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: remittance.exe, 00000016.00000002.414806118.0000000003401000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: dhcpmon.exe, 0000001E.00000002.446559269.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000001E.00000002.446559269.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Yara matchFile source: 4.0.remittance.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.445060c.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.4454c35.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.6184629.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.6180000.24.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.445060c.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.6180000.24.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.remittance.exe.3cff4d0.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.3c60a62.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 22.2.remittance.exe.444b7d6.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.3c4c435.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.remittance.exe.3c40201.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.remittance.exe.3cff4d0.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000002.523139135.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000016.00000002.414806118.0000000003401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000000.290583986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001E.00000002.446559269.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: remittance.exe PID: 5568, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: remittance.exe PID: 5320, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: remittance.exe PID: 4656, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4688, type: MEMORYSTR
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Windows Management Instrumentation
1
Scheduled Task/Job
112
Process Injection
2
Masquerading
11
Input Capture
111
Security Software Discovery
Remote Services11
Input Capture
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Scheduled Task/Job
Boot or Logon Initialization Scripts1
Scheduled Task/Job
1
Disable or Modify Tools
LSASS Memory2
Process Discovery
Remote Desktop Protocol11
Archive Collected Data
Exfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
Virtualization/Sandbox Evasion
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Remote Access Software
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer1
Non-Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets1
File and Directory Discovery
SSHKeyloggingData Transfer Size Limits21
Application Layer Protocol
Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Hidden Files and Directories
Cached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items2
Obfuscated Files or Information
DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job11
Software Packing
Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 708238 Sample: remittance.exe Startdate: 23/09/2022 Architecture: WINDOWS Score: 100 69 Snort IDS alert for network traffic 2->69 71 Multi AV Scanner detection for domain / URL 2->71 73 Malicious sample detected (through community Yara rule) 2->73 75 14 other signatures 2->75 8 remittance.exe 6 2->8         started        12 dhcpmon.exe 4 2->12         started        14 remittance.exe 4 2->14         started        16 dhcpmon.exe 2->16         started        process3 file4 61 C:\Users\user\AppData\...\QgSBwlYTdt.exe, PE32 8->61 dropped 63 C:\Users\user\AppData\Local\...\tmpAD34.tmp, XML 8->63 dropped 65 C:\Users\user\AppData\...\remittance.exe.log, ASCII 8->65 dropped 79 Uses schtasks.exe or at.exe to add and modify task schedules 8->79 81 Injects a PE file into a foreign processes 8->81 18 remittance.exe 1 16 8->18         started        23 schtasks.exe 1 8->23         started        25 schtasks.exe 12->25         started        27 dhcpmon.exe 12->27         started        37 3 other processes 12->37 29 schtasks.exe 14->29         started        31 remittance.exe 14->31         started        33 schtasks.exe 16->33         started        35 dhcpmon.exe 16->35         started        signatures5 process6 dnsIp7 67 brightnano1.ddns.net 171.22.30.97, 1989, 49702, 49703 CMCSUS Germany 18->67 55 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->55 dropped 57 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 18->57 dropped 59 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->59 dropped 77 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->77 39 schtasks.exe 1 18->39         started        41 schtasks.exe 1 18->41         started        43 conhost.exe 23->43         started        45 conhost.exe 25->45         started        47 conhost.exe 29->47         started        49 conhost.exe 33->49         started        file8 signatures9 process10 process11 51 conhost.exe 39->51         started        53 conhost.exe 41->53         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
remittance.exe8%ReversingLabs
remittance.exe26%VirustotalBrowse
remittance.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\QgSBwlYTdt.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLinkDownload
4.0.remittance.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
4.2.remittance.exe.6180000.24.unpack100%AviraTR/NanoCore.fadteDownload File
SourceDetectionScannerLabelLink
brightnano1.ddns.net11%VirustotalBrowse
SourceDetectionScannerLabelLink
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.carterandcone.com0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/:0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/60%URL Reputationsafe
http://www.carterandcone.comue0%URL Reputationsafe
http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/(0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/#0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.urwpp.de0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.carterandcone.como.0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
http://www.fontbureau.com.TTF0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/Y0%URL Reputationsafe
http://www.fontbureau.comF0%URL Reputationsafe
http://www.carterandcone.comTC0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/P0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/F0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
http://www.fontbureau.coma0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.founder.com.cn/cn/0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/u0%URL Reputationsafe
http://www.fontbureau.comld0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/k0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/es-e0%URL Reputationsafe
http://www.zhongyicts.com.cno.0%URL Reputationsafe
http://www.fontbureau.comalic0%URL Reputationsafe
0%Avira URL Cloudsafe
http://www.carterandcone.coms0%;0%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/Kurs0%Avira URL Cloudsafe
http://www.goodfont.co.krl0%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/Y0lk0%Avira URL Cloudsafe
http://www.sandoll.co.krt-it-h0%Avira URL Cloudsafe
http://www.urwpp.deom0%Avira URL Cloudsafe
http://www.carterandcone.comNS0%Avira URL Cloudsafe
http://www.goodfont.co.krmk0%Avira URL Cloudsafe
http://www.sakkal.comP0%Avira URL Cloudsafe
http://www.sakkal.comd0%Avira URL Cloudsafe
http://www.fonts.comion0%Avira URL Cloudsafe
brightnano1.ddns.net100%Avira URL Cloudmalware
http://en.wikipedia(0%Avira URL Cloudsafe
http://www.sakkal.com00%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/el0%Avira URL Cloudsafe
http://www.fontbureau.comsivaO0%Avira URL Cloudsafe
http://www.founder.com.cn/cncom0%Avira URL Cloudsafe
http://www.zhongyicts.com.cnT0%Avira URL Cloudsafe
http://www.tiro.com~Z0%Avira URL Cloudsafe
http://www.sandoll.co.kro.krcr0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
brightnano1.ddns.net
171.22.30.97
truetrueunknown
NameMaliciousAntivirus DetectionReputation
true
  • Avira URL Cloud: safe
low
brightnano1.ddns.nettrue
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://www.fontbureau.com/designersGremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://www.fontbureau.com/designers/?remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.founder.com.cn/cn/bTheremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.fontbureau.com/designers?remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.carterandcone.coms0%;remittance.exe, 00000000.00000003.255212778.0000000005951000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255284729.0000000005951000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255421189.0000000005951000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        low
        http://www.tiro.comremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.carterandcone.comNSremittance.exe, 00000000.00000003.255212778.0000000005951000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designersremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.jiyu-kobo.co.jp/Y0lkremittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.goodfont.co.krremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://google.comremittance.exe, 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmpfalse
            high
            http://www.carterandcone.comremittance.exe, 00000000.00000003.255212778.0000000005951000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255284729.0000000005951000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255421189.0000000005951000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.sajatypeworks.comremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.typography.netDremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/cTheremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/:remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255721208.0000000005923000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256068123.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.galapagosdesign.com/staff/dennis.htmremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://fontfabrik.comremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.urwpp.deomremittance.exe, 00000000.00000003.260046920.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/Kursremittance.exe, 00000000.00000003.257020488.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256827860.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/6remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255721208.0000000005923000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256068123.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.sandoll.co.krt-it-hremittance.exe, 00000000.00000003.253346124.000000000592E000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.carterandcone.comueremittance.exe, 00000000.00000003.255212778.0000000005951000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255284729.0000000005951000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255421189.0000000005951000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp//remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.galapagosdesign.com/DPleaseremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/(remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fonts.comremittance.exe, 00000000.00000003.251831584.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.251901759.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254537231.000000000594F000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.252868092.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254144082.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.252443291.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254376366.000000000594F000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.251866759.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.252685408.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.252259158.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.253977771.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254109489.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.252232497.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.252389352.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.251996989.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.251682033.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.253103524.0000000005955000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.252176157.0000000005955000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.sandoll.co.krremittance.exe, 00000000.00000003.253346124.000000000592E000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.goodfont.co.krlremittance.exe, 00000000.00000003.253346124.000000000592E000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.jiyu-kobo.co.jp/#remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.sakkal.comdremittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.urwpp.deDPleaseremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.urwpp.deremittance.exe, 00000000.00000003.260046920.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.zhongyicts.com.cnremittance.exe, 00000000.00000003.254920591.0000000005952000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254844773.0000000005950000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254910360.000000000594F000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameremittance.exe, 00000000.00000002.295989192.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000004.00000002.523139135.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000010.00000002.377885898.00000000032AD000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000012.00000002.410525725.0000000002AC8000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000013.00000002.404695909.0000000002A11000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.carterandcone.como.remittance.exe, 00000000.00000003.255421189.0000000005951000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.sakkal.comremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com.TTFremittance.exe, 00000000.00000003.260376505.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.260046920.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fonts.comionremittance.exe, 00000000.00000003.251840471.000000000106C000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp/Yremittance.exe, 00000000.00000003.256068123.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.goodfont.co.krmkremittance.exe, 00000000.00000003.253346124.000000000592E000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.apache.org/licenses/LICENSE-2.0remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254757127.000000000594F000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.comremittance.exe, 00000000.00000003.260376505.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.260046920.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.sakkal.comPremittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.comFremittance.exe, 00000000.00000003.260376505.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.260046920.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comTCremittance.exe, 00000000.00000003.255212778.0000000005951000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/Premittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256068123.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://en.wikipedia(remittance.exe, 00000000.00000003.254099244.000000000594D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254127821.000000000594D000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.jiyu-kobo.co.jp/Fremittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.257020488.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256827860.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.257090388.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/jp/remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.257020488.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256827860.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.comaremittance.exe, 00000000.00000003.293674688.0000000005920000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comlremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/remittance.exe, 00000000.00000003.254920591.0000000005952000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254537231.000000000594F000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254844773.0000000005950000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254376366.000000000594F000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254910360.000000000594F000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254757127.000000000594F000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.253346124.000000000592E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/elremittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256068123.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlNremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.sakkal.com0remittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.comsivaOremittance.exe, 00000000.00000003.260376505.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.260046920.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.founder.com.cn/cnremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/frere-jones.htmlremittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/uremittance.exe, 00000000.00000003.257020488.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256827860.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cncomremittance.exe, 00000000.00000003.253900998.000000000594D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.253988482.000000000594D000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.comldremittance.exe, 00000000.00000003.293674688.0000000005920000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/remittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.257020488.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.255721208.0000000005923000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256827860.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256068123.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256774420.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sandoll.co.kro.krcrremittance.exe, 00000000.00000003.253346124.000000000592E000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/kremittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256614790.000000000592A000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256659668.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/es-eremittance.exe, 00000000.00000003.256131310.000000000592D000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256188885.0000000005927000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.256395891.0000000005925000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cno.remittance.exe, 00000000.00000003.254910360.000000000594F000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers8remittance.exe, 00000000.00000002.305506569.0000000006B32000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comalicremittance.exe, 00000000.00000003.260376505.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.260572463.0000000005932000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.260046920.0000000005932000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cnTremittance.exe, 00000000.00000003.254920591.0000000005952000.00000004.00000800.00020000.00000000.sdmp, remittance.exe, 00000000.00000003.254910360.000000000594F000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.tiro.com~Zremittance.exe, 00000000.00000003.254563663.000000000106C000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          171.22.30.97
                          brightnano1.ddns.netGermany
                          33657CMCSUStrue
                          Joe Sandbox Version:36.0.0 Rainbow Opal
                          Analysis ID:708238
                          Start date and time:2022-09-23 07:54:52 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 10m 45s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Sample file name:remittance.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:34
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@36/17@12/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 25
                          • Number of non-executed functions: 2
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ctldl.windowsupdate.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtDeviceIoControlFile calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          07:56:00API Interceptor735x Sleep call for process: remittance.exe modified
                          07:56:16AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          07:56:17Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\remittance.exe" s>$(Arg0)
                          07:56:20Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                          07:56:35API Interceptor2x Sleep call for process: dhcpmon.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          171.22.30.97RFQ23449.exeGet hashmaliciousBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            brightnano1.ddns.netRe Remittance Advice.exeGet hashmaliciousBrowse
                            • 171.22.30.97
                            RFQ23449.exeGet hashmaliciousBrowse
                            • 171.22.30.97
                            SecuriteInfo.com.W32.AIDetectNet.01.22085.exeGet hashmaliciousBrowse
                            • 107.182.129.128
                            SecuriteInfo.com.IL.Trojan.MSILZilla.22069.19688.exeGet hashmaliciousBrowse
                            • 107.182.129.128
                            SecuriteInfo.com.W32.AIDetectNet.01.13156.exeGet hashmaliciousBrowse
                            • 107.182.129.128
                            gfcytttt.exeGet hashmaliciousBrowse
                            • 107.182.129.128
                            SecuriteInfo.com.W32.AIDetectNet.01.17432.exeGet hashmaliciousBrowse
                            • 105.112.217.248
                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            CMCSUSPO_300000010134016_DDD22003212998760-Pdf.gz.exeGet hashmaliciousBrowse
                            • 81.161.229.75
                            Re order 144 23-09-2022.exeGet hashmaliciousBrowse
                            • 81.161.229.7
                            ZslLRJTwYo.exeGet hashmaliciousBrowse
                            • 171.22.30.106
                            ZslLRJTwYo.exeGet hashmaliciousBrowse
                            • 171.22.30.106
                            Quotation-no. 2210993 AN.exeGet hashmaliciousBrowse
                            • 81.161.229.7
                            SecuriteInfo.com.Win32.PWSX-gen.27375.exeGet hashmaliciousBrowse
                            • 171.22.30.147
                            gunzipped.exeGet hashmaliciousBrowse
                            • 81.161.229.75
                            987654345678998.exeGet hashmaliciousBrowse
                            • 81.161.229.110
                            i686-20220921-0518.elfGet hashmaliciousBrowse
                            • 50.226.169.227
                            SecuriteInfo.com.Win32.PWSX-gen.8398.exeGet hashmaliciousBrowse
                            • 81.161.229.110
                            G98rGd5tiL.exeGet hashmaliciousBrowse
                            • 81.161.229.110
                            SecuriteInfo.com.Win32.Evo-gen.11435.exeGet hashmaliciousBrowse
                            • 81.161.229.136
                            oijhC6rRVY.exeGet hashmaliciousBrowse
                            • 171.22.30.164
                            SecuriteInfo.com.Win32.Evo-gen.3458.exeGet hashmaliciousBrowse
                            • 81.161.229.187
                            QdqEJ9TKoc.exeGet hashmaliciousBrowse
                            • 171.22.30.106
                            mVvKQYDVux.exeGet hashmaliciousBrowse
                            • 171.22.30.147
                            gunzipped.exeGet hashmaliciousBrowse
                            • 81.161.229.75
                            QdqEJ9TKoc.exeGet hashmaliciousBrowse
                            • 171.22.30.106
                            gunzipped.exeGet hashmaliciousBrowse
                            • 81.161.229.75
                            J8pM3VLrxF.exeGet hashmaliciousBrowse
                            • 81.161.229.110
                            No context
                            No context
                            Process:C:\Users\user\Desktop\remittance.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1066496
                            Entropy (8bit):6.704936269736051
                            Encrypted:false
                            SSDEEP:12288:BGVMmLXxPgZ8Uqcozk9h5uRsOLNoJ86aA/qoUmdaee/QCaCNqGVM9d4dIw8:B1mRgZjqco49hKssoJ8tydLC/VIdkIt
                            MD5:31C5C19E5CBF0993BAEEF892E8F73ADA
                            SHA1:3F39DD3802F34E7F0B8D307A5AA31DAAC779C3C8
                            SHA-256:B9B9FA184AFCFE0808C76A42A44A22E960D0283CF763C120BE371122D0DE8174
                            SHA-512:083B584A585FC100EE3619AD31042D0B9188E2BF81EC3F178FB2E89A2854AF30D57ADEF2E59E46E48F0A6ABFD951706D5DEE52D9479F4C12317DD0FDF2E4FE86
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....!-c..............P..V..........^u... ........@.. ....................................@..................................u..O.......H............................>..T............................................ ............... ..H............text...dU... ...V.................. ..`.rsrc...H............X..............@..@.reloc...............D..............@..B................@u......H.......h...._............................................................(....*&..(.....*.s.........s ........s!........s"........s#........*...0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....r9..p~....o-...(......t$....+..*...0..&........(....rE..p~....o-...(......
                            Process:C:\Users\user\Desktop\remittance.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.355304211458859
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                            MD5:69206D3AF7D6EFD08F4B4726998856D3
                            SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                            SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                            SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                            Malicious:false
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                            Process:C:\Users\user\Desktop\remittance.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.355304211458859
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                            MD5:69206D3AF7D6EFD08F4B4726998856D3
                            SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                            SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                            SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                            Malicious:true
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                            Process:C:\Users\user\Desktop\remittance.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1659
                            Entropy (8bit):5.1742056536028755
                            Encrypted:false
                            SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBZtn:cbhH7MlNQ8/rydbz9I3YODOLNdq3F
                            MD5:90E0DD9D30D70B9B789776727D6CD3BB
                            SHA1:80F98DE3F9D4F88E0CAEB3C5D774695B9572AEAE
                            SHA-256:4C804D823977F1DD3714ECF01D3C8E4A7B36F863C5A0D04E7AFB0B00FB846F47
                            SHA-512:633938024CF9453D6ABD6C376340607AF4C343835984D20DD4F59B740EB70C1B9C936FC2CE96028A71EE6DDA384AA0BA7B00837083764E656B65B56F308BB50C
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1659
                            Entropy (8bit):5.1742056536028755
                            Encrypted:false
                            SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBZtn:cbhH7MlNQ8/rydbz9I3YODOLNdq3F
                            MD5:90E0DD9D30D70B9B789776727D6CD3BB
                            SHA1:80F98DE3F9D4F88E0CAEB3C5D774695B9572AEAE
                            SHA-256:4C804D823977F1DD3714ECF01D3C8E4A7B36F863C5A0D04E7AFB0B00FB846F47
                            SHA-512:633938024CF9453D6ABD6C376340607AF4C343835984D20DD4F59B740EB70C1B9C936FC2CE96028A71EE6DDA384AA0BA7B00837083764E656B65B56F308BB50C
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1659
                            Entropy (8bit):5.1742056536028755
                            Encrypted:false
                            SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBZtn:cbhH7MlNQ8/rydbz9I3YODOLNdq3F
                            MD5:90E0DD9D30D70B9B789776727D6CD3BB
                            SHA1:80F98DE3F9D4F88E0CAEB3C5D774695B9572AEAE
                            SHA-256:4C804D823977F1DD3714ECF01D3C8E4A7B36F863C5A0D04E7AFB0B00FB846F47
                            SHA-512:633938024CF9453D6ABD6C376340607AF4C343835984D20DD4F59B740EB70C1B9C936FC2CE96028A71EE6DDA384AA0BA7B00837083764E656B65B56F308BB50C
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                            Process:C:\Users\user\Desktop\remittance.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1659
                            Entropy (8bit):5.1742056536028755
                            Encrypted:false
                            SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBZtn:cbhH7MlNQ8/rydbz9I3YODOLNdq3F
                            MD5:90E0DD9D30D70B9B789776727D6CD3BB
                            SHA1:80F98DE3F9D4F88E0CAEB3C5D774695B9572AEAE
                            SHA-256:4C804D823977F1DD3714ECF01D3C8E4A7B36F863C5A0D04E7AFB0B00FB846F47
                            SHA-512:633938024CF9453D6ABD6C376340607AF4C343835984D20DD4F59B740EB70C1B9C936FC2CE96028A71EE6DDA384AA0BA7B00837083764E656B65B56F308BB50C
                            Malicious:true
                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                            Process:C:\Users\user\Desktop\remittance.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1304
                            Entropy (8bit):5.083908227241512
                            Encrypted:false
                            SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Txtn:cbk4oL600QydbQxIYODOLedq3Mj
                            MD5:0461E5417F7B83DC1D8DEB0CF8D35762
                            SHA1:B86B8833F25C91B15B67038FA3CD5D0F8CD9F3C9
                            SHA-256:D371A16053407C3AB323FDBF050C8E2339B4DF8348BBBA61703DD7B2A4F4C642
                            SHA-512:09CDBAFE7417BF21837AEE68270DD8238753021B6EF83B96CF0DE3F6B5372D0A97EECA7CE63586B99700EFB4347F7F1EB0614309247EE06331DC11BC090FACCE
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                            Process:C:\Users\user\Desktop\remittance.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1310
                            Entropy (8bit):5.109425792877704
                            Encrypted:false
                            SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                            MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                            SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                            SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                            SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                            Process:C:\Users\user\Desktop\remittance.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):232
                            Entropy (8bit):7.024371743172393
                            Encrypted:false
                            SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                            MD5:32D0AAE13696FF7F8AF33B2D22451028
                            SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                            SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                            SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                            Malicious:false
                            Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                            Process:C:\Users\user\Desktop\remittance.exe
                            File Type:Non-ISO extended-ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):8
                            Entropy (8bit):3.0
                            Encrypted:false
                            SSDEEP:3:tyt:k
                            MD5:CF0DBE61CCFB385B907254B94C4E3430
                            SHA1:34F2828C4166EEABAB2FFFFE71A163393A0118A9
                            SHA-256:8382A9087BC0D1D0F5C29EE2FF5609E2AF54853E4707D8064F61FB5BEFD1B556
                            SHA-512:EC523B28FB7EE959392CE491E9C484F3FED1831DE5E27497FEB70C2C41B56A5C62DA7D7F0873D31FDC1238D66935D6FB56987A1DD7AB43ABAA387AFB6B1946FF
                            Malicious:true
                            Preview:6..s..H
                            Process:C:\Users\user\Desktop\remittance.exe
                            File Type:data
                            Category:modified
                            Size (bytes):24
                            Entropy (8bit):4.501629167387823
                            Encrypted:false
                            SSDEEP:3:9bzY6oRDIvYk:RzWDI3
                            MD5:ACD3FB4310417DC77FE06F15B0E353E6
                            SHA1:80E7002E655EB5765FDEB21114295CB96AD9D5EB
                            SHA-256:DC3AE604991C9BB8FF8BC4502AE3D0DB8A3317512C0F432490B103B89C1A4368
                            SHA-512:DA46A917DB6276CD4528CFE4AD113292D873CA2EBE53414730F442B83502E5FAF3D1AE87BFA295ADF01E3B44FDBCE239E21A318BFB2CCD1F4753846CB21F6F97
                            Malicious:false
                            Preview:9iH...}Z.4..f..J".C;"a
                            Process:C:\Users\user\Desktop\remittance.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):40
                            Entropy (8bit):5.153055907333276
                            Encrypted:false
                            SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                            MD5:4E5E92E2369688041CC82EF9650EDED2
                            SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                            SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                            SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                            Malicious:false
                            Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                            Process:C:\Users\user\Desktop\remittance.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):327432
                            Entropy (8bit):7.99938831605763
                            Encrypted:true
                            SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                            MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                            SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                            SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                            SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                            Malicious:false
                            Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                            Process:C:\Users\user\Desktop\remittance.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):41
                            Entropy (8bit):4.030567322750604
                            Encrypted:false
                            SSDEEP:3:oN0naRRXeELXJ:oNcSRuETJ
                            MD5:DE35DDE4CA7722A94CBC9BB3B13D04F5
                            SHA1:B73A406E9E5A4CEB6EFC6BC758272EF1810EC9AE
                            SHA-256:F99CE96A413109B65B60981759201A90948616BC5C616ABA9011286930471874
                            SHA-512:FA152B76392F9F6D427730428F1F764F061FD4DB29FB8C73246E5C61524241089C3C08922AD31CD27836084DAE455D37ABEFB4B92E2CDF13A97DB3C7EFF29DE8
                            Malicious:false
                            Preview:C:\Users\user\Desktop\remittance.exe
                            Process:C:\Users\user\Desktop\remittance.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1066496
                            Entropy (8bit):6.704936269736051
                            Encrypted:false
                            SSDEEP:12288:BGVMmLXxPgZ8Uqcozk9h5uRsOLNoJ86aA/qoUmdaee/QCaCNqGVM9d4dIw8:B1mRgZjqco49hKssoJ8tydLC/VIdkIt
                            MD5:31C5C19E5CBF0993BAEEF892E8F73ADA
                            SHA1:3F39DD3802F34E7F0B8D307A5AA31DAAC779C3C8
                            SHA-256:B9B9FA184AFCFE0808C76A42A44A22E960D0283CF763C120BE371122D0DE8174
                            SHA-512:083B584A585FC100EE3619AD31042D0B9188E2BF81EC3F178FB2E89A2854AF30D57ADEF2E59E46E48F0A6ABFD951706D5DEE52D9479F4C12317DD0FDF2E4FE86
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....!-c..............P..V..........^u... ........@.. ....................................@..................................u..O.......H............................>..T............................................ ............... ..H............text...dU... ...V.................. ..`.rsrc...H............X..............@..@.reloc...............D..............@..B................@u......H.......h...._............................................................(....*&..(.....*.s.........s ........s!........s"........s#........*...0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....r9..p~....o-...(......t$....+..*...0..&........(....rE..p~....o-...(......
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):6.704936269736051
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                            • Win32 Executable (generic) a (10002005/4) 49.75%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Windows Screen Saver (13104/52) 0.07%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            File name:remittance.exe
                            File size:1066496
                            MD5:31c5c19e5cbf0993baeef892e8f73ada
                            SHA1:3f39dd3802f34e7f0b8d307a5aa31daac779c3c8
                            SHA256:b9b9fa184afcfe0808c76a42a44a22e960d0283cf763c120be371122d0de8174
                            SHA512:083b584a585fc100ee3619ad31042d0b9188e2bf81ec3f178fb2e89a2854af30d57adef2e59e46e48f0a6abfd951706d5dee52d9479f4c12317dd0fdf2e4fe86
                            SSDEEP:12288:BGVMmLXxPgZ8Uqcozk9h5uRsOLNoJ86aA/qoUmdaee/QCaCNqGVM9d4dIw8:B1mRgZjqco49hKssoJ8tydLC/VIdkIt
                            TLSH:35353B1022EB577CF47A5BB95BD4B4F64BD6FE615229E1FA28A073494732E00CCE1236
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....!-c..............P..V..........^u... ........@.. ....................................@................................
                            Icon Hash:b4b4b4747cec9404
                            Entrypoint:0x4f755e
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x632D2106 [Fri Sep 23 02:59:18 2022 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xf750c0x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xf80000xea48.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1080000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0xf3e980x54.text
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xf55640xf5600False0.5823645647605705data6.784690132291941IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0xf80000xea480xec00False0.3647212658898305data4.963894931143003IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x1080000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountry
                            RT_ICON0xf81e00x2dedPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                            RT_ICON0xfafe00x4228dBase III DBT, version number 0, next free block index 40
                            RT_ICON0xff2180x25a8dBase III DBT, version number 0, next free block index 40
                            RT_ICON0x1017d00x1a68dBase III DBT, version number 0, next free block index 40
                            RT_ICON0x1032480x10a8dBase III DBT, version number 0, next free block index 40
                            RT_ICON0x1043000x988data
                            RT_ICON0x104c980x6b8dBase III DBT, version number 0, next free block index 40
                            RT_ICON0x1053600x468GLS_BINARY_LSB_FIRST
                            RT_GROUP_ICON0x1057d80x76data
                            RT_VERSION0x1058600x3bcdata
                            RT_MANIFEST0x105c2c0xe15XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            171.22.30.97192.168.2.71989497052810290 09/23/22-07:56:53.827103TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 1198949705171.22.30.97192.168.2.7
                            192.168.2.7171.22.30.974971119892816766 09/23/22-07:57:41.247890TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497111989192.168.2.7171.22.30.97
                            192.168.2.7171.22.30.974970619892816766 09/23/22-07:57:06.725139TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497061989192.168.2.7171.22.30.97
                            171.22.30.97192.168.2.71989497132841753 09/23/22-07:58:14.093577TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)198949713171.22.30.97192.168.2.7
                            171.22.30.97192.168.2.71989497052841753 09/23/22-07:56:53.710839TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)198949705171.22.30.97192.168.2.7
                            192.168.2.7171.22.30.974970819892816766 09/23/22-07:57:20.810472TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497081989192.168.2.7171.22.30.97
                            171.22.30.97192.168.2.71989497092841753 09/23/22-07:57:29.506018TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)198949709171.22.30.97192.168.2.7
                            192.168.2.7171.22.30.974970419892816766 09/23/22-07:56:47.366861TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497041989192.168.2.7171.22.30.97
                            192.168.2.7171.22.30.974970219892816766 09/23/22-07:56:26.749349TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497021989192.168.2.7171.22.30.97
                            192.168.2.7171.22.30.974970719892816766 09/23/22-07:57:12.636515TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497071989192.168.2.7171.22.30.97
                            192.168.2.7171.22.30.974971019892816766 09/23/22-07:57:35.334869TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497101989192.168.2.7171.22.30.97
                            192.168.2.7171.22.30.974971219892816766 09/23/22-07:57:47.430003TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497121989192.168.2.7171.22.30.97
                            171.22.30.97192.168.2.71989497112841753 09/23/22-07:57:41.521548TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)198949711171.22.30.97192.168.2.7
                            171.22.30.97192.168.2.71989497102841753 09/23/22-07:57:35.595884TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)198949710171.22.30.97192.168.2.7
                            192.168.2.7171.22.30.974970819892816718 09/23/22-07:57:19.224935TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497081989192.168.2.7171.22.30.97
                            192.168.2.7171.22.30.974970319892816766 09/23/22-07:56:33.758479TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497031989192.168.2.7171.22.30.97
                            TimestampSource PortDest PortSource IPDest IP
                            Sep 23, 2022 07:56:21.482043982 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:21.509731054 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:21.510103941 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:22.216409922 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:22.256000996 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:22.324546099 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:22.423261881 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:22.424520016 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:22.452661037 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:22.593451977 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.184242964 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.321696997 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.558301926 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.721668005 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.796843052 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.796885967 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.796962976 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.797007084 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.797070980 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.797106981 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.828367949 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.828425884 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.828466892 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.828504086 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.828546047 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.828577042 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.828577995 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.828619003 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.828659058 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.828725100 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.828782082 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.828788996 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.856030941 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.856092930 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.856134892 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.856170893 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.856209993 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.856252909 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.856290102 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.856328964 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.856367111 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.856370926 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.856406927 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.856420994 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.856427908 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.856434107 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.856458902 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.859765053 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.859795094 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.859818935 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.859842062 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.859858990 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.859874964 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.859915972 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.859960079 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.886225939 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886291981 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886332035 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886368990 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886408091 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886446953 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886486053 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886526108 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886563063 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886600971 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886609077 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.886640072 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886660099 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.886667967 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.886672974 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.886677980 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.886678934 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886719942 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886737108 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.886759043 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886799097 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886816025 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.886840105 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886876106 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886890888 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.886915922 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886955976 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.886967897 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.886993885 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.887044907 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.888641119 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.888680935 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.888720036 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.888758898 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.888781071 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.888796091 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.888829947 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.888837099 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.888875961 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.888889074 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.888915062 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.888955116 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.888971090 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.889004946 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.889049053 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.889076948 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.889090061 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.889146090 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.915580034 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.915627003 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.915663004 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.915697098 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.915752888 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.915783882 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.915805101 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.915813923 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.915844917 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.915855885 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.915862083 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.915870905 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.915903091 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.915926933 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.915935040 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.915966034 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.915976048 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.915997982 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916018009 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.916029930 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916058064 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916080952 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.916090012 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916124105 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916142941 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.916156054 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916213036 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.916224003 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916258097 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916286945 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916306019 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.916321993 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916351080 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916368961 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.916380882 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916412115 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916430950 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.916443110 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916474104 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916490078 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.916507006 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916536093 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916555882 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.916568041 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916604996 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916619062 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.916635036 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916665077 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916695118 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916697025 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.916724920 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916747093 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.916755915 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.916804075 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.917665005 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.917697906 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.917762995 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.917938948 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.917970896 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.918000937 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.918028116 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.918029070 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.918060064 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.918080091 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.918091059 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.918122053 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.918138027 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.918154001 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.918181896 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.918198109 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.918212891 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.918262005 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.944291115 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.944324017 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.944343090 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.944355965 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.944372892 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.944390059 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.944438934 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.944463968 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.944514990 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945106983 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945141077 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945162058 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945180893 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945198059 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945202112 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945223093 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945236921 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945269108 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945269108 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945291996 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945311069 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945311069 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945333004 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945347071 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945367098 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945369005 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945388079 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945405006 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945409060 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945426941 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945429087 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945450068 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945462942 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945468903 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945488930 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945502043 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945508003 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945528030 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945542097 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945548058 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945565939 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945580959 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945585966 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945605040 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945621967 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945622921 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945643902 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945661068 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945671082 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945693970 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945712090 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945714951 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945735931 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945755005 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:23.945755959 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.945794106 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:23.973551989 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.093595982 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.421468973 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.484287977 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.857933044 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.885363102 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885390043 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885406971 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885457039 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885462046 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.885476112 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885495901 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885498047 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.885514021 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885530949 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885535955 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.885548115 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885564089 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885565996 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.885581017 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885597944 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885603905 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.885615110 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885632038 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885642052 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.885651112 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885664940 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.885669947 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885687113 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885703087 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885705948 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.885720968 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885737896 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885740042 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.885771036 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.885804892 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885823011 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885835886 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885852098 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885864019 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.885869026 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885888100 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885895014 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.885905027 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885922909 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885931015 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.885938883 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885956049 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.885956049 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885976076 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885992050 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.885992050 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.886009932 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886027098 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.886027098 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886045933 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886061907 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886071920 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.886080027 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886091948 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.886096954 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886115074 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886131048 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886131048 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.886148930 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886166096 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.886166096 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886183977 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886200905 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886204004 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.886219978 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886235952 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886235952 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.886255026 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886271000 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886272907 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.886287928 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:24.886306047 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:24.984386921 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.063926935 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.083686113 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.111598015 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.111639977 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.111668110 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.111690998 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.111695051 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.111723900 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.111741066 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.111752033 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.111779928 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.111793041 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.111807108 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.111834049 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.111850977 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.111916065 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.111943960 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.111965895 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.111970901 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.111996889 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112016916 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.112025023 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112052917 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112066031 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.112080097 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112107992 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112123966 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.112134933 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112162113 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112176895 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.112189054 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112227917 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.112281084 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112309933 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112335920 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112361908 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.112375975 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112384081 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112410069 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112436056 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112442970 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.112457037 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112483978 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112488031 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.112507105 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112534046 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112570047 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112592936 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.112596989 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112620115 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112638950 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112659931 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112679958 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112706900 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112729073 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.112734079 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112755060 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112787008 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.112787008 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112802982 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112828970 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.112831116 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112859011 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112884045 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112894058 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.112905025 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112931967 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112934113 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.112958908 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.112961054 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.112987041 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.113010883 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.140655994 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.140714884 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.140748978 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.140784025 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.140785933 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.140806913 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.140818119 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.140851974 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.140866041 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.140886068 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.140921116 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.140927076 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.140966892 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.140999079 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.141006947 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.141032934 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.141067028 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.141081095 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.141112089 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.141144991 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.141155958 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.141177893 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.141208887 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.141222954 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.141242981 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.141274929 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.141287088 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.141309023 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.141341925 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.141351938 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.141377926 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.141410112 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.141427994 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.141443014 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.141465902 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:25.141489983 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:25.209574938 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:26.749349117 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:26.823654890 CEST198949702171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:26.940139055 CEST497021989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:32.826822996 CEST497031989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:32.854557037 CEST198949703171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:32.854665995 CEST497031989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:32.855242968 CEST497031989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:32.914577961 CEST198949703171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:32.914851904 CEST497031989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:32.943032980 CEST198949703171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:33.078689098 CEST497031989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:33.173455000 CEST497031989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:33.321741104 CEST198949703171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:33.352885962 CEST198949703171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:33.470544100 CEST497031989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:33.498325109 CEST198949703171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:33.578782082 CEST497031989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:33.758479118 CEST497031989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:33.921626091 CEST198949703171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:34.185725927 CEST497031989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:34.321733952 CEST198949703171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:34.321887970 CEST497031989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:34.350214005 CEST198949703171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:34.469444990 CEST497031989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:34.497167110 CEST198949703171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:34.578841925 CEST497031989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:34.984961987 CEST497031989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:46.427687883 CEST497041989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:46.455082893 CEST198949704171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:46.455224991 CEST497041989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:46.692208052 CEST497041989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:46.788521051 CEST198949704171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:47.187838078 CEST198949704171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:47.283050060 CEST497041989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:47.331275940 CEST497041989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:47.359428883 CEST198949704171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:47.366861105 CEST497041989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:47.488593102 CEST198949704171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:47.533440113 CEST497041989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:47.687558889 CEST198949704171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:47.756520987 CEST198949704171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:47.805609941 CEST497041989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:47.833110094 CEST198949704171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:47.970618010 CEST497041989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:48.112670898 CEST497041989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:48.140541077 CEST198949704171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:48.189332962 CEST497041989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:48.538131952 CEST497041989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:48.539789915 CEST497041989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:48.566555023 CEST198949704171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:48.566678047 CEST497041989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:53.645215988 CEST497051989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:53.673151970 CEST198949705171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:53.673259020 CEST497051989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:53.674323082 CEST497051989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:53.710839033 CEST198949705171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:53.799248934 CEST497051989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:53.827102900 CEST198949705171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:53.960541010 CEST497051989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:54.053456068 CEST497051989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:54.081883907 CEST198949705171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:54.287272930 CEST497051989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:54.416840076 CEST497051989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:54.588809967 CEST198949705171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:54.602251053 CEST198949705171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:54.710308075 CEST497051989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:54.738271952 CEST198949705171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:54.739507914 CEST497051989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:54.767633915 CEST198949705171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:54.767781973 CEST497051989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:54.769685030 CEST497051989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:56:54.795984030 CEST198949705171.22.30.97192.168.2.7
                            Sep 23, 2022 07:56:54.796072006 CEST497051989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:04.588244915 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:04.616178036 CEST198949706171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:04.616425991 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:05.263212919 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:05.308116913 CEST198949706171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:05.324493885 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:05.353449106 CEST198949706171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:05.420218945 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:05.795384884 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:05.922827959 CEST198949706171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:06.293803930 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:06.422838926 CEST198949706171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:06.479484081 CEST198949706171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:06.588807106 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:06.616739035 CEST198949706171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:06.690893888 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:06.725138903 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:06.821669102 CEST198949706171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:06.821739912 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:06.850220919 CEST198949706171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:06.987807989 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:07.015578985 CEST198949706171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:07.097174883 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:07.201733112 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:07.321790934 CEST198949706171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:07.596230030 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:07.721803904 CEST198949706171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:07.994019032 CEST497061989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:12.064341068 CEST497071989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:12.092163086 CEST198949707171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:12.092252970 CEST497071989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:12.092816114 CEST497071989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:12.195575953 CEST198949707171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:12.195818901 CEST497071989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:12.227638006 CEST198949707171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:12.285113096 CEST497071989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:12.415174007 CEST497071989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:12.521467924 CEST198949707171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:12.603077888 CEST198949707171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:12.608141899 CEST497071989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:12.635615110 CEST198949707171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:12.636514902 CEST497071989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:12.721548080 CEST198949707171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:12.722368002 CEST497071989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:12.757327080 CEST198949707171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:12.977547884 CEST497071989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:13.005088091 CEST198949707171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:13.082103014 CEST497071989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:14.098387003 CEST497071989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:18.251739979 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:18.279562950 CEST198949708171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:18.280179977 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:18.303508043 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:18.346040964 CEST198949708171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:18.346997976 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:18.376424074 CEST198949708171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:18.478564978 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:19.224935055 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:19.388478994 CEST198949708171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:20.810472012 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:20.888572931 CEST198949708171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:21.265856981 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:21.388509035 CEST198949708171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:21.496685028 CEST198949708171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:21.582792997 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:21.610601902 CEST198949708171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:21.785912991 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:22.533044100 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:22.788526058 CEST198949708171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:23.279616117 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:23.307849884 CEST198949708171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:23.473572016 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:23.599081993 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:23.627161980 CEST198949708171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:23.786201954 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:23.863327026 CEST497081989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:29.204253912 CEST497091989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:29.232224941 CEST198949709171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:29.232388973 CEST497091989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:29.232812881 CEST497091989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:29.274950027 CEST198949709171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:29.277790070 CEST497091989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:29.308552027 CEST198949709171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:29.349112034 CEST497091989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:29.506017923 CEST198949709171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:29.552233934 CEST497091989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:29.558118105 CEST497091989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:29.687483072 CEST198949709171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:29.744738102 CEST198949709171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:29.748281002 CEST497091989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:29.776218891 CEST198949709171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:29.817920923 CEST497091989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:29.845689058 CEST198949709171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:29.846056938 CEST497091989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:29.874453068 CEST198949709171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:29.874694109 CEST497091989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:29.902637959 CEST198949709171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:29.904520988 CEST497091989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:29.988682985 CEST198949709171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:30.247673035 CEST497091989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:34.423504114 CEST497101989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:34.450931072 CEST198949710171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:34.453510046 CEST497101989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:34.457492113 CEST497101989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:34.517995119 CEST198949710171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:34.518420935 CEST497101989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:34.546189070 CEST198949710171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:34.599553108 CEST497101989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:34.760224104 CEST497101989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:34.921793938 CEST198949710171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:34.946358919 CEST198949710171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:34.947876930 CEST497101989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:34.975456953 CEST198949710171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:35.021485090 CEST497101989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:35.048942089 CEST198949710171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:35.049587965 CEST497101989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:35.077436924 CEST198949710171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:35.077550888 CEST497101989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:35.105262995 CEST198949710171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:35.105973005 CEST497101989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:35.222441912 CEST198949710171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:35.334868908 CEST497101989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:35.421669006 CEST198949710171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:35.514991999 CEST198949710171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:35.568434954 CEST497101989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:35.595884085 CEST198949710171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:35.646495104 CEST497101989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:36.423726082 CEST497101989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:40.485719919 CEST497111989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:40.514519930 CEST198949711171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:40.514820099 CEST497111989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:40.515398979 CEST497111989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:40.570950985 CEST198949711171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:40.571269035 CEST497111989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:40.599771023 CEST198949711171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:40.647164106 CEST497111989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:40.784125090 CEST497111989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:40.921897888 CEST198949711171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:40.983463049 CEST198949711171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:41.037597895 CEST497111989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:41.065350056 CEST198949711171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:41.115748882 CEST497111989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:41.119165897 CEST497111989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:41.222754002 CEST198949711171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:41.247889996 CEST497111989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:41.322118998 CEST198949711171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:41.326040030 CEST497111989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:41.362062931 CEST198949711171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:41.412647963 CEST497111989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:41.440749884 CEST198949711171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:41.490783930 CEST497111989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:41.521548033 CEST198949711171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:41.573019028 CEST497111989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:42.178822041 CEST497111989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:46.241733074 CEST497121989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:46.269593000 CEST198949712171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:46.269686937 CEST497121989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:46.270358086 CEST497121989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:46.320245981 CEST198949712171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:46.320740938 CEST497121989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:46.348912954 CEST198949712171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:46.397407055 CEST497121989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:46.435223103 CEST497121989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:46.522516966 CEST198949712171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:46.542360067 CEST497121989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:46.621568918 CEST198949712171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:46.732597113 CEST198949712171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:46.736933947 CEST497121989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:46.764599085 CEST198949712171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:46.768040895 CEST497121989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:46.795938969 CEST198949712171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:46.796648979 CEST497121989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:46.824856997 CEST198949712171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:46.825115919 CEST497121989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:46.921595097 CEST198949712171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:47.430002928 CEST497121989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:47.521583080 CEST198949712171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:48.854413033 CEST497121989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:52.935774088 CEST497131989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:52.967211008 CEST198949713171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:52.969170094 CEST497131989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:52.969830990 CEST497131989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:53.008516073 CEST198949713171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:53.008799076 CEST497131989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:53.037333965 CEST198949713171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:53.085551023 CEST497131989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:53.247008085 CEST497131989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:53.321784973 CEST198949713171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:53.431201935 CEST198949713171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:53.431701899 CEST497131989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:53.463231087 CEST198949713171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:53.465086937 CEST497131989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:53.493211985 CEST198949713171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:53.493388891 CEST497131989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:53.523304939 CEST198949713171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:53.569406033 CEST497131989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:57:55.013521910 CEST198949713171.22.30.97192.168.2.7
                            Sep 23, 2022 07:57:55.054447889 CEST497131989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:58:01.536659002 CEST198949713171.22.30.97192.168.2.7
                            Sep 23, 2022 07:58:01.699733019 CEST497131989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:58:01.727560997 CEST198949713171.22.30.97192.168.2.7
                            Sep 23, 2022 07:58:01.836219072 CEST497131989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:58:07.546601057 CEST198949713171.22.30.97192.168.2.7
                            Sep 23, 2022 07:58:07.743061066 CEST497131989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:58:11.029047012 CEST198949713171.22.30.97192.168.2.7
                            Sep 23, 2022 07:58:11.243370056 CEST497131989192.168.2.7171.22.30.97
                            Sep 23, 2022 07:58:14.093576908 CEST198949713171.22.30.97192.168.2.7
                            Sep 23, 2022 07:58:14.243560076 CEST497131989192.168.2.7171.22.30.97
                            TimestampSource PortDest PortSource IPDest IP
                            Sep 23, 2022 07:56:21.361603022 CEST5575253192.168.2.78.8.8.8
                            Sep 23, 2022 07:56:21.383256912 CEST53557528.8.8.8192.168.2.7
                            Sep 23, 2022 07:56:32.793658018 CEST5033053192.168.2.78.8.8.8
                            Sep 23, 2022 07:56:32.813060999 CEST53503308.8.8.8192.168.2.7
                            Sep 23, 2022 07:56:46.083199024 CEST5658853192.168.2.78.8.8.8
                            Sep 23, 2022 07:56:46.104861021 CEST53565888.8.8.8192.168.2.7
                            Sep 23, 2022 07:56:53.618938923 CEST6032653192.168.2.78.8.8.8
                            Sep 23, 2022 07:56:53.638699055 CEST53603268.8.8.8192.168.2.7
                            Sep 23, 2022 07:57:03.385513067 CEST5083553192.168.2.78.8.8.8
                            Sep 23, 2022 07:57:03.408543110 CEST53508358.8.8.8192.168.2.7
                            Sep 23, 2022 07:57:12.039894104 CEST5050553192.168.2.78.8.8.8
                            Sep 23, 2022 07:57:12.063334942 CEST53505058.8.8.8192.168.2.7
                            Sep 23, 2022 07:57:18.231241941 CEST6117853192.168.2.78.8.8.8
                            Sep 23, 2022 07:57:18.250767946 CEST53611788.8.8.8192.168.2.7
                            Sep 23, 2022 07:57:29.180773973 CEST6392653192.168.2.78.8.8.8
                            Sep 23, 2022 07:57:29.203119040 CEST53639268.8.8.8192.168.2.7
                            Sep 23, 2022 07:57:34.402625084 CEST5333653192.168.2.78.8.8.8
                            Sep 23, 2022 07:57:34.421861887 CEST53533368.8.8.8192.168.2.7
                            Sep 23, 2022 07:57:40.466837883 CEST5100753192.168.2.78.8.8.8
                            Sep 23, 2022 07:57:40.484746933 CEST53510078.8.8.8192.168.2.7
                            Sep 23, 2022 07:57:46.221164942 CEST5051353192.168.2.78.8.8.8
                            Sep 23, 2022 07:57:46.239267111 CEST53505138.8.8.8192.168.2.7
                            Sep 23, 2022 07:57:52.903994083 CEST6076553192.168.2.78.8.8.8
                            Sep 23, 2022 07:57:52.922050953 CEST53607658.8.8.8192.168.2.7
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Sep 23, 2022 07:56:21.361603022 CEST192.168.2.78.8.8.80x2ac4Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                            Sep 23, 2022 07:56:32.793658018 CEST192.168.2.78.8.8.80x18c8Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                            Sep 23, 2022 07:56:46.083199024 CEST192.168.2.78.8.8.80x33faStandard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                            Sep 23, 2022 07:56:53.618938923 CEST192.168.2.78.8.8.80x6943Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:03.385513067 CEST192.168.2.78.8.8.80x8c89Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:12.039894104 CEST192.168.2.78.8.8.80x5a72Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:18.231241941 CEST192.168.2.78.8.8.80x66b5Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:29.180773973 CEST192.168.2.78.8.8.80xa5a5Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:34.402625084 CEST192.168.2.78.8.8.80x2366Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:40.466837883 CEST192.168.2.78.8.8.80x2a0eStandard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:46.221164942 CEST192.168.2.78.8.8.80x7977Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:52.903994083 CEST192.168.2.78.8.8.80x5e9Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Sep 23, 2022 07:56:21.383256912 CEST8.8.8.8192.168.2.70x2ac4No error (0)brightnano1.ddns.net171.22.30.97A (IP address)IN (0x0001)false
                            Sep 23, 2022 07:56:32.813060999 CEST8.8.8.8192.168.2.70x18c8No error (0)brightnano1.ddns.net171.22.30.97A (IP address)IN (0x0001)false
                            Sep 23, 2022 07:56:46.104861021 CEST8.8.8.8192.168.2.70x33faNo error (0)brightnano1.ddns.net171.22.30.97A (IP address)IN (0x0001)false
                            Sep 23, 2022 07:56:53.638699055 CEST8.8.8.8192.168.2.70x6943No error (0)brightnano1.ddns.net171.22.30.97A (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:03.408543110 CEST8.8.8.8192.168.2.70x8c89No error (0)brightnano1.ddns.net171.22.30.97A (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:12.063334942 CEST8.8.8.8192.168.2.70x5a72No error (0)brightnano1.ddns.net171.22.30.97A (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:18.250767946 CEST8.8.8.8192.168.2.70x66b5No error (0)brightnano1.ddns.net171.22.30.97A (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:29.203119040 CEST8.8.8.8192.168.2.70xa5a5No error (0)brightnano1.ddns.net171.22.30.97A (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:34.421861887 CEST8.8.8.8192.168.2.70x2366No error (0)brightnano1.ddns.net171.22.30.97A (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:40.484746933 CEST8.8.8.8192.168.2.70x2a0eNo error (0)brightnano1.ddns.net171.22.30.97A (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:46.239267111 CEST8.8.8.8192.168.2.70x7977No error (0)brightnano1.ddns.net171.22.30.97A (IP address)IN (0x0001)false
                            Sep 23, 2022 07:57:52.922050953 CEST8.8.8.8192.168.2.70x5e9No error (0)brightnano1.ddns.net171.22.30.97A (IP address)IN (0x0001)false

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:07:55:47
                            Start date:23/09/2022
                            Path:C:\Users\user\Desktop\remittance.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\remittance.exe"
                            Imagebase:0x520000
                            File size:1066496 bytes
                            MD5 hash:31C5C19E5CBF0993BAEEF892E8F73ADA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.302004595.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.300781701.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:low

                            Target ID:1
                            Start time:07:56:07
                            Start date:23/09/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmpAD34.tmp
                            Imagebase:0x11f0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:2
                            Start time:07:56:08
                            Start date:23/09/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6edaf0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:4
                            Start time:07:56:09
                            Start date:23/09/2022
                            Path:C:\Users\user\Desktop\remittance.exe
                            Wow64 process (32bit):true
                            Commandline:{path}
                            Imagebase:0x760000
                            File size:1066496 bytes
                            MD5 hash:31C5C19E5CBF0993BAEEF892E8F73ADA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.547330853.0000000005F00000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000003.322686052.00000000063EB000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.536603069.0000000003B91000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.540559764.0000000003DAE000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.551697216.0000000006F40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.551697216.0000000006F40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.551697216.0000000006F40000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.551697216.0000000006F40000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.539191821.0000000003D0A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.546662397.00000000055B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.546662397.00000000055B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.546662397.00000000055B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.546662397.00000000055B0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.552246512.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.523139135.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.523139135.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.524449336.0000000002B2B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.547248773.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.548156224.0000000006180000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.547117878.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.551554712.0000000006F30000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.551554712.0000000006F30000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.551554712.0000000006F30000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.551554712.0000000006F30000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.290583986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.290583986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.290583986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000000.290583986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.547043213.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.552056208.0000000006F70000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.552340856.0000000007160000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.552340856.0000000007160000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.552340856.0000000007160000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.552340856.0000000007160000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.552120650.0000000006F80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.552120650.0000000006F80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.552120650.0000000006F80000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.552120650.0000000006F80000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.547605387.0000000005F20000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.547605387.0000000005F20000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.547605387.0000000005F20000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.547605387.0000000005F20000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.547869881.0000000005F40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.547869881.0000000005F40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.547869881.0000000005F40000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.547869881.0000000005F40000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.535725850.0000000003AC1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:low

                            Target ID:13
                            Start time:07:56:15
                            Start date:23/09/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpB828.tmp
                            Imagebase:0x11f0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:14
                            Start time:07:56:16
                            Start date:23/09/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6edaf0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:15
                            Start time:07:56:17
                            Start date:23/09/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpC057.tmp
                            Imagebase:0x11f0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:16
                            Start time:07:56:17
                            Start date:23/09/2022
                            Path:C:\Users\user\Desktop\remittance.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\Desktop\remittance.exe 0
                            Imagebase:0xdd0000
                            File size:1066496 bytes
                            MD5 hash:31C5C19E5CBF0993BAEEF892E8F73ADA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Reputation:low

                            Target ID:17
                            Start time:07:56:18
                            Start date:23/09/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6edaf0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:18
                            Start time:07:56:20
                            Start date:23/09/2022
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                            Imagebase:0x5a0000
                            File size:1066496 bytes
                            MD5 hash:31C5C19E5CBF0993BAEEF892E8F73ADA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Antivirus matches:
                            • Detection: 100%, Joe Sandbox ML
                            Reputation:low

                            Target ID:19
                            Start time:07:56:25
                            Start date:23/09/2022
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                            Imagebase:0x540000
                            File size:1066496 bytes
                            MD5 hash:31C5C19E5CBF0993BAEEF892E8F73ADA
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:.Net C# or VB.NET
                            Reputation:low

                            Target ID:20
                            Start time:07:56:39
                            Start date:23/09/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmp264C.tmp
                            Imagebase:0x11f0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:21
                            Start time:07:56:43
                            Start date:23/09/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6edaf0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:22
                            Start time:07:56:45
                            Start date:23/09/2022
                            Path:C:\Users\user\Desktop\remittance.exe
                            Wow64 process (32bit):true
                            Commandline:{path}
                            Imagebase:0xfe0000
                            File size:1066496 bytes
                            MD5 hash:31C5C19E5CBF0993BAEEF892E8F73ADA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000016.00000002.417596435.0000000004409000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.414806118.0000000003401000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.414806118.0000000003401000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000016.00000002.414806118.0000000003401000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                            Target ID:23
                            Start time:07:56:46
                            Start date:23/09/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmp4136.tmp
                            Imagebase:0x11f0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:24
                            Start time:07:56:48
                            Start date:23/09/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6edaf0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:25
                            Start time:07:56:49
                            Start date:23/09/2022
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):false
                            Commandline:{path}
                            Imagebase:0x2d0000
                            File size:1066496 bytes
                            MD5 hash:31C5C19E5CBF0993BAEEF892E8F73ADA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:26
                            Start time:07:56:51
                            Start date:23/09/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgSBwlYTdt" /XML "C:\Users\user\AppData\Local\Temp\tmp5403.tmp
                            Imagebase:0x11f0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language

                            Target ID:27
                            Start time:07:56:51
                            Start date:23/09/2022
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):false
                            Commandline:{path}
                            Imagebase:0x60000
                            File size:1066496 bytes
                            MD5 hash:31C5C19E5CBF0993BAEEF892E8F73ADA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:28
                            Start time:07:56:52
                            Start date:23/09/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6edaf0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language

                            Target ID:29
                            Start time:07:56:53
                            Start date:23/09/2022
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):false
                            Commandline:{path}
                            Imagebase:0x170000
                            File size:1066496 bytes
                            MD5 hash:31C5C19E5CBF0993BAEEF892E8F73ADA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:30
                            Start time:07:56:54
                            Start date:23/09/2022
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):true
                            Commandline:{path}
                            Imagebase:0xbd0000
                            File size:1066496 bytes
                            MD5 hash:31C5C19E5CBF0993BAEEF892E8F73ADA
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000002.446559269.0000000003141000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001E.00000002.446559269.0000000003141000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000001E.00000002.446559269.0000000003141000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                            Target ID:31
                            Start time:07:56:54
                            Start date:23/09/2022
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):true
                            Commandline:{path}
                            Imagebase:0x550000
                            File size:1066496 bytes
                            MD5 hash:31C5C19E5CBF0993BAEEF892E8F73ADA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET

                            Reset < >

                              Execution Graph

                              Execution Coverage:10.9%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:69
                              Total number of Limit Nodes:2
                              execution_graph 11602 4dfb970 11603 4dfb9d6 11602->11603 11606 4dfbb30 11603->11606 11609 4df9948 11606->11609 11610 4dfbfa0 DuplicateHandle 11609->11610 11611 4dfba85 11610->11611 11612 4df9470 11615 4df9970 11612->11615 11613 4df947f 11616 4df9983 11615->11616 11617 4df999b 11616->11617 11622 4df9bf8 11616->11622 11617->11613 11618 4df9993 11618->11617 11619 4df9b98 GetModuleHandleW 11618->11619 11620 4df9bc5 11619->11620 11620->11613 11623 4df9c0c 11622->11623 11625 4df9c31 11623->11625 11626 4df95c0 11623->11626 11625->11618 11627 4df9dd8 LoadLibraryExW 11626->11627 11629 4df9e51 11627->11629 11629->11625 11630 4df6690 11631 4df66a7 11630->11631 11634 4df57ec 11631->11634 11633 4df66b4 11635 4df57f7 11634->11635 11638 4df53b8 11635->11638 11637 4df6785 11637->11633 11639 4df53c3 11638->11639 11642 4df53e8 11639->11642 11641 4df6c6a 11641->11637 11643 4df53f3 11642->11643 11646 4df6820 11643->11646 11645 4df6d62 11645->11641 11647 4df682b 11646->11647 11648 4df74bc 11647->11648 11651 4dfb590 11647->11651 11655 4dfb5a0 11647->11655 11648->11645 11652 4dfb594 11651->11652 11653 4dfb5e5 11652->11653 11659 4dfb858 11652->11659 11653->11648 11656 4dfb5a4 11655->11656 11657 4dfb5e5 11656->11657 11658 4dfb858 2 API calls 11656->11658 11657->11648 11658->11657 11660 4dfb865 11659->11660 11661 4dfb89f 11660->11661 11663 4df98c0 11660->11663 11661->11653 11665 4df98cb 11663->11665 11664 4dfc598 11665->11664 11667 4dfbbe4 11665->11667 11668 4dfbbef 11667->11668 11669 4df6820 2 API calls 11668->11669 11670 4dfc607 11669->11670 11674 4dfe390 11670->11674 11680 4dfe378 11670->11680 11671 4dfc640 11671->11664 11676 4dfe3c1 11674->11676 11677 4dfe40e 11674->11677 11675 4dfe3cd 11675->11671 11676->11675 11685 4dfe6c9 11676->11685 11689 4dfe6d8 11676->11689 11677->11671 11681 4dfe382 11680->11681 11682 4dfe3cd 11681->11682 11683 4dfe6c9 2 API calls 11681->11683 11684 4dfe6d8 2 API calls 11681->11684 11682->11671 11683->11682 11684->11682 11686 4dfe6cc 11685->11686 11687 4df9970 LoadLibraryExW GetModuleHandleW 11686->11687 11688 4dfe6e1 11687->11688 11688->11677 11690 4df9970 LoadLibraryExW GetModuleHandleW 11689->11690 11691 4dfe6e1 11690->11691 11691->11677

                              Control-flow Graph

                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 04DF9BB6
                              Memory Dump Source
                              • Source File: 00000000.00000002.303501703.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4df0000_remittance.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 9249e70544d2c703a32cabb1a858fe6e7f7c15415925b74bed651b74c3c15d5e
                              • Instruction ID: 28bb7f0e1dba9f416f39fddc8710b359d94bb3e989a436e9dd5565151acc01fa
                              • Opcode Fuzzy Hash: 9249e70544d2c703a32cabb1a858fe6e7f7c15415925b74bed651b74c3c15d5e
                              • Instruction Fuzzy Hash: D97124B0A00B058FD724DF2AD45479ABBF1FF88314F01896ED68AD7A50EB34F9458B91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 55 4df9948-4dfc034 DuplicateHandle 57 4dfc03d-4dfc05a 55->57 58 4dfc036-4dfc03c 55->58 58->57
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,04DFBB5E,?,?,?,?,?), ref: 04DFC027
                              Memory Dump Source
                              • Source File: 00000000.00000002.303501703.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4df0000_remittance.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 8bfa8b26a3b5299876adfd60e41b0867b4485b6953edfb4ab3c7c5f7e474c359
                              • Instruction ID: 1d1e09c72dd47a7e2aa44ebd86f0e0c010604b1e4cb648794de2a5f583723e8c
                              • Opcode Fuzzy Hash: 8bfa8b26a3b5299876adfd60e41b0867b4485b6953edfb4ab3c7c5f7e474c359
                              • Instruction Fuzzy Hash: 812103B59002489FDB10CFAAD884BEEBBF8FB48324F15801AE954A3310D374A950CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 61 4df9dd0-4df9dd2 62 4df9dd8-4df9e18 61->62 63 4df9dd4-4df9dd6 61->63 64 4df9e1a-4df9e1d 62->64 65 4df9e20-4df9e4f LoadLibraryExW 62->65 63->62 64->65 66 4df9e58-4df9e75 65->66 67 4df9e51-4df9e57 65->67 67->66
                              APIs
                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,04DF9C31,00000800,00000000,00000000), ref: 04DF9E42
                              Memory Dump Source
                              • Source File: 00000000.00000002.303501703.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4df0000_remittance.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: d1bad5e30b76797df9547a91f435af83dc6d26b061d358a57e65b557919f9a8c
                              • Instruction ID: 5eaf1185b4e821009a7e9a1e0a60299b4ebf192c3e166c6d6129867f8b48608b
                              • Opcode Fuzzy Hash: d1bad5e30b76797df9547a91f435af83dc6d26b061d358a57e65b557919f9a8c
                              • Instruction Fuzzy Hash: DD2106B6D002498FDB10CF9AD844BDFBBF4FB88324F15846AD555A7200C374A545CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 70 4df95c0-4df9e18 72 4df9e1a-4df9e1d 70->72 73 4df9e20-4df9e4f LoadLibraryExW 70->73 72->73 74 4df9e58-4df9e75 73->74 75 4df9e51-4df9e57 73->75 75->74
                              APIs
                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,04DF9C31,00000800,00000000,00000000), ref: 04DF9E42
                              Memory Dump Source
                              • Source File: 00000000.00000002.303501703.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4df0000_remittance.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 2a805f1131060aaf188c760c7f798daf7548b674c42b4467a9977c7dfa4da3f0
                              • Instruction ID: 3067c2165cf195e130af60830d063f2d577178aa59239574ebcc3859f0419004
                              • Opcode Fuzzy Hash: 2a805f1131060aaf188c760c7f798daf7548b674c42b4467a9977c7dfa4da3f0
                              • Instruction Fuzzy Hash: 031106B6D002489FDB10CF9AD844BDFBBF4EB88314F15845AE555A7600C374A545CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 78 4df9b50-4df9b90 79 4df9b98-4df9bc3 GetModuleHandleW 78->79 80 4df9b92-4df9b95 78->80 81 4df9bcc-4df9be0 79->81 82 4df9bc5-4df9bcb 79->82 80->79 82->81
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 04DF9BB6
                              Memory Dump Source
                              • Source File: 00000000.00000002.303501703.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4df0000_remittance.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 63ca618492d19c1754dcecfa1c128eaf2577a83c6077c736e4ef9087d82a4f5b
                              • Instruction ID: a4d09d749643204757c7d260834b08d226c467a445dd883e3fd57a52479c2e65
                              • Opcode Fuzzy Hash: 63ca618492d19c1754dcecfa1c128eaf2577a83c6077c736e4ef9087d82a4f5b
                              • Instruction Fuzzy Hash: D8110FB2C002498FCB20CF9AC884BDEFBF4AB88324F15845AD959A7600C374A545CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.303501703.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4df0000_remittance.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2067130b38aeff0d1a4ed8d72ab260f45e12ea416849f545ba5c74cfe9ca1989
                              • Instruction ID: 892e5fe854d9b65028c620c5f0c91ac6f508d22dcfa01699992d3578bc88f45c
                              • Opcode Fuzzy Hash: 2067130b38aeff0d1a4ed8d72ab260f45e12ea416849f545ba5c74cfe9ca1989
                              • Instruction Fuzzy Hash: BE12B4F1611F4ADAE710CF65EC881893BB1B786B28F904308D2615FAF1D7B8154AEF94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.303501703.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4df0000_remittance.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 844a3c60f981e642896ae5c511343b11122ced4cd162254481d0a01bd4e3f9fa
                              • Instruction ID: 763913bd43c70078b831ef2b5a459db965ed6eab9a9f250dff12799102218ea5
                              • Opcode Fuzzy Hash: 844a3c60f981e642896ae5c511343b11122ced4cd162254481d0a01bd4e3f9fa
                              • Instruction Fuzzy Hash: 68C149F1611B4ACBD710DF65EC881893B71BB86B28F514308D2616FAF1D7B8144AEF94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Execution Graph

                              Execution Coverage:14.2%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:272
                              Total number of Limit Nodes:21
                              execution_graph 20483 2aa6758 20486 2aa6344 20483->20486 20485 2aa6766 20487 2aa634f 20486->20487 20490 2aa6394 20487->20490 20489 2aa688d 20489->20485 20491 2aa639f 20490->20491 20494 2aa63c4 20491->20494 20493 2aa6962 20493->20489 20495 2aa63cf 20494->20495 20498 2aa63f4 20495->20498 20497 2aa6a62 20497->20493 20500 2aa63ff 20498->20500 20499 2aa71bc 20499->20497 20500->20499 20503 2aab408 20500->20503 20508 2aab3f9 20500->20508 20504 2aab429 20503->20504 20505 2aab44d 20504->20505 20513 2aab5aa 20504->20513 20517 2aab5b8 20504->20517 20505->20499 20509 2aab408 20508->20509 20510 2aab44d 20509->20510 20511 2aab5aa 6 API calls 20509->20511 20512 2aab5b8 6 API calls 20509->20512 20510->20499 20511->20510 20512->20510 20514 2aab5c5 20513->20514 20515 2aab5ff 20514->20515 20521 2aaa0ec 20514->20521 20515->20505 20518 2aab5c5 20517->20518 20519 2aab5ff 20518->20519 20520 2aaa0ec 6 API calls 20518->20520 20519->20505 20520->20519 20522 2aaa0f7 20521->20522 20524 2aac2f8 20522->20524 20525 2aab904 20522->20525 20524->20524 20526 2aab90f 20525->20526 20527 2aa63f4 6 API calls 20526->20527 20528 2aac367 20527->20528 20535 2aac3d1 20528->20535 20539 2aac3e0 20528->20539 20529 2aac375 20531 2aae0d8 LoadLibraryExW GetModuleHandleW CreateWindowExW CreateWindowExW 20529->20531 20532 2aae0f0 LoadLibraryExW GetModuleHandleW CreateWindowExW CreateWindowExW 20529->20532 20530 2aac3a0 20530->20524 20531->20530 20532->20530 20537 2aac40e 20535->20537 20536 2aac4df 20537->20536 20538 2aac4da KiUserCallbackDispatcher 20537->20538 20538->20536 20540 2aac40e 20539->20540 20541 2aac4da KiUserCallbackDispatcher 20540->20541 20542 2aac4df 20540->20542 20541->20542 20543 66631d0 20544 66631d9 20543->20544 20548 6663248 20544->20548 20553 6663258 20544->20553 20545 666320a 20549 6663258 20548->20549 20558 6663280 20549->20558 20563 6663290 20549->20563 20550 6663274 20550->20545 20554 666325d 20553->20554 20556 6663280 DnsQuery_A 20554->20556 20557 6663290 DnsQuery_A 20554->20557 20555 6663274 20555->20545 20556->20555 20557->20555 20559 66632ae 20558->20559 20560 66632d6 20559->20560 20568 6663398 20559->20568 20572 6663389 20559->20572 20560->20550 20564 66632ae 20563->20564 20565 66632d6 20564->20565 20566 6663398 DnsQuery_A 20564->20566 20567 6663389 DnsQuery_A 20564->20567 20565->20550 20566->20564 20567->20564 20569 66633c1 20568->20569 20576 66618fc 20569->20576 20573 6663398 20572->20573 20574 66618fc DnsQuery_A 20573->20574 20575 6663402 20574->20575 20575->20559 20577 6663610 DnsQuery_A 20576->20577 20579 666374a 20577->20579 20451 2aa92f0 20452 2aa92ff 20451->20452 20455 2aa93e8 20451->20455 20463 2aa93d9 20451->20463 20456 2aa93fb 20455->20456 20458 2aa9413 20456->20458 20471 2aa9660 20456->20471 20475 2aa9670 20456->20475 20457 2aa940b 20457->20458 20459 2aa9610 GetModuleHandleW 20457->20459 20458->20452 20460 2aa963d 20459->20460 20460->20452 20464 2aa93fb 20463->20464 20465 2aa9413 20464->20465 20469 2aa9660 LoadLibraryExW 20464->20469 20470 2aa9670 LoadLibraryExW 20464->20470 20465->20452 20466 2aa940b 20466->20465 20467 2aa9610 GetModuleHandleW 20466->20467 20468 2aa963d 20467->20468 20468->20452 20469->20466 20470->20466 20472 2aa9684 20471->20472 20474 2aa96a9 20472->20474 20479 2aa8768 20472->20479 20474->20457 20476 2aa9684 20475->20476 20477 2aa96a9 20476->20477 20478 2aa8768 LoadLibraryExW 20476->20478 20477->20457 20478->20477 20481 2aa9850 LoadLibraryExW 20479->20481 20482 2aa98c9 20481->20482 20482->20474 20580 2aab6d0 20581 2aab736 20580->20581 20585 2aabc88 20581->20585 20588 2aabc98 20581->20588 20582 2aab7e5 20591 2aaa14c 20585->20591 20589 2aabcc6 20588->20589 20590 2aaa14c DuplicateHandle 20588->20590 20589->20582 20590->20589 20592 2aabd00 DuplicateHandle 20591->20592 20593 2aabcc6 20592->20593 20593->20582 20258 6665168 20259 6665182 20258->20259 20262 6664ee0 20259->20262 20263 6664f0a 20262->20263 20265 6664f12 20262->20265 20264 6664f41 20265->20264 20267 6664ff0 20265->20267 20270 666501a 20267->20270 20268 666513f 20268->20264 20270->20268 20271 6663e18 20270->20271 20272 6663e46 20271->20272 20276 6663e85 20271->20276 20273 6663e77 20272->20273 20274 6663e8a 20272->20274 20275 6663f0d 20272->20275 20272->20276 20281 6664108 20273->20281 20274->20276 20287 6665230 20274->20287 20299 6665220 20274->20299 20275->20276 20280 6664ff0 2 API calls 20275->20280 20276->20268 20280->20276 20283 6664130 20281->20283 20282 66641aa 20282->20276 20283->20282 20284 66641a0 20283->20284 20311 66641f8 20283->20311 20321 66651e8 20284->20321 20288 6665251 20287->20288 20292 6665307 20287->20292 20290 666525e 20288->20290 20291 666530c 20288->20291 20289 66652be 20289->20292 20297 6665220 2 API calls 20289->20297 20298 6665230 2 API calls 20289->20298 20290->20289 20387 6665470 20290->20387 20392 6665480 20290->20392 20291->20292 20295 6665220 2 API calls 20291->20295 20296 6665230 2 API calls 20291->20296 20292->20276 20295->20292 20296->20292 20297->20292 20298->20292 20300 6665230 20299->20300 20302 666525e 20300->20302 20303 666530c 20300->20303 20304 6665307 20300->20304 20301 66652be 20301->20304 20309 6665220 2 API calls 20301->20309 20310 6665230 2 API calls 20301->20310 20302->20301 20305 6665470 2 API calls 20302->20305 20306 6665480 2 API calls 20302->20306 20303->20304 20307 6665220 2 API calls 20303->20307 20308 6665230 2 API calls 20303->20308 20304->20276 20305->20301 20306->20301 20307->20304 20308->20304 20309->20304 20310->20304 20312 666430e 20311->20312 20314 666421c 20311->20314 20333 6666713 20312->20333 20340 6666707 20312->20340 20347 6666570 20312->20347 20354 6666580 20312->20354 20313 66642d4 20313->20284 20325 66643a8 20314->20325 20329 6664398 20314->20329 20323 66651f0 20321->20323 20322 6665218 20322->20282 20323->20322 20324 6663e18 2 API calls 20323->20324 20324->20322 20326 66643dc 20325->20326 20328 6664ee0 2 API calls 20326->20328 20327 666448a 20327->20313 20328->20327 20330 66643dc 20329->20330 20332 6664ee0 2 API calls 20330->20332 20331 666448a 20331->20313 20332->20331 20334 666662c 20333->20334 20337 666663c 20333->20337 20334->20337 20361 6666780 20334->20361 20365 6666790 20334->20365 20336 666673d 20336->20313 20337->20336 20369 6666460 20337->20369 20341 666662c 20340->20341 20342 666663c 20341->20342 20345 6666780 2 API calls 20341->20345 20346 6666790 2 API calls 20341->20346 20343 666673d 20342->20343 20344 6666460 2 API calls 20342->20344 20343->20313 20344->20342 20345->20342 20346->20342 20351 6666580 20347->20351 20348 666663c 20349 666673d 20348->20349 20350 6666460 2 API calls 20348->20350 20349->20313 20350->20348 20351->20348 20352 6666780 2 API calls 20351->20352 20353 6666790 2 API calls 20351->20353 20352->20348 20353->20348 20355 66665a3 20354->20355 20356 666663c 20355->20356 20359 6666780 2 API calls 20355->20359 20360 6666790 2 API calls 20355->20360 20357 666673d 20356->20357 20358 6666460 2 API calls 20356->20358 20357->20313 20358->20356 20359->20356 20360->20356 20363 6666790 20361->20363 20362 6666872 20362->20337 20363->20362 20374 66668b0 20363->20374 20366 6666872 20365->20366 20367 66667ba 20365->20367 20366->20337 20367->20366 20368 66668b0 2 API calls 20367->20368 20368->20367 20372 6666472 20369->20372 20370 6666476 20370->20337 20371 6666550 20371->20337 20372->20370 20372->20371 20373 66641f8 2 API calls 20372->20373 20373->20371 20376 66668b5 20374->20376 20375 66668bb 20375->20363 20376->20375 20379 66668f0 20376->20379 20380 66668d4 20379->20380 20381 6666909 20379->20381 20380->20363 20383 6660f28 20381->20383 20385 6660f38 20383->20385 20384 6660fa5 20384->20380 20385->20384 20386 6661470 CreateWindowExW CreateWindowExW 20385->20386 20386->20384 20389 66654a0 20387->20389 20388 66654c0 20388->20289 20389->20388 20397 6665540 20389->20397 20407 6665530 20389->20407 20393 66654a0 20392->20393 20394 66654c0 20393->20394 20395 6665540 2 API calls 20393->20395 20396 6665530 2 API calls 20393->20396 20394->20289 20395->20394 20396->20394 20398 666554c 20397->20398 20401 666555c 20397->20401 20399 6665553 20398->20399 20400 6665569 20398->20400 20398->20401 20417 66655a8 20399->20417 20423 6665598 20399->20423 20429 6665770 20400->20429 20433 6665760 20400->20433 20437 6665b88 20400->20437 20401->20388 20408 666554c 20407->20408 20410 666555c 20407->20410 20409 6665553 20408->20409 20408->20410 20411 6665569 20408->20411 20412 66655a8 2 API calls 20409->20412 20413 6665598 2 API calls 20409->20413 20410->20388 20414 6665760 2 API calls 20411->20414 20415 6665770 2 API calls 20411->20415 20416 6665b88 2 API calls 20411->20416 20412->20410 20413->20410 20414->20410 20415->20410 20416->20410 20420 66655b0 20417->20420 20418 666562d 20419 666562a 20419->20401 20420->20418 20441 6665648 20420->20441 20447 66656a8 20420->20447 20424 666559b 20423->20424 20426 666562d 20424->20426 20427 6665648 2 API calls 20424->20427 20428 66656a8 2 API calls 20424->20428 20425 666562a 20425->20401 20427->20425 20428->20425 20431 666579c 20429->20431 20430 6665a01 20430->20401 20431->20430 20432 6665648 2 API calls 20431->20432 20432->20431 20435 6665763 20433->20435 20434 6665a01 20434->20401 20435->20434 20436 6665648 2 API calls 20435->20436 20436->20435 20439 6665b94 20437->20439 20438 6665b9d 20438->20401 20439->20438 20440 6664ee0 2 API calls 20439->20440 20440->20438 20442 666565a 20441->20442 20444 6665661 20441->20444 20442->20419 20443 6665683 20443->20419 20444->20443 20445 6664ee0 2 API calls 20444->20445 20446 666574b 20445->20446 20446->20419 20448 66656ab 20447->20448 20449 6664ee0 2 API calls 20448->20449 20450 666574b 20449->20450 20450->20419
                              Memory Dump Source
                              • Source File: 00000004.00000002.551241841.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6660000_remittance.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 93f3f152c6d8b7c8ad7d57ac7a027a314601f2f13017372f551350982db3fc68
                              • Instruction ID: db3d8b6d659e7dbdb83850bc3a6c59d361c490e33050eaf736f4debcc5924c4e
                              • Opcode Fuzzy Hash: 93f3f152c6d8b7c8ad7d57ac7a027a314601f2f13017372f551350982db3fc68
                              • Instruction Fuzzy Hash: 8351D278D12208DFDB04DFA5E858AEEBBB2FF49300F108029E915A7394DB35A946CF54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 136 6663558-6663574 137 6663576-6663587 136->137 138 666358a-66635eb 136->138 147 66635c8-66635f7 138->147 148 66635f9-6663683 138->148 154 6663685-666368f 148->154 155 66636bc-66636ef 148->155 154->155 156 6663691-6663693 154->156 164 66636f7-6663748 DnsQuery_A 155->164 157 66636b6-66636b9 156->157 158 6663695-666369f 156->158 157->155 161 66636a3-66636b2 158->161 162 66636a1 158->162 161->161 163 66636b4 161->163 162->161 163->157 165 6663751-666379e 164->165 166 666374a-6663750 164->166 171 66637a0-66637a4 165->171 172 66637ae-66637b2 165->172 166->165 171->172 173 66637a6 171->173 174 66637b4-66637b7 172->174 175 66637c1-66637c5 172->175 173->172 174->175 176 66637d6 175->176 177 66637c7-66637d3 175->177 179 66637d7 176->179 177->176 179->179
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.551241841.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6660000_remittance.jbxd
                              Similarity
                              • API ID:
                              • String ID: 'O*P$'O*P
                              • API String ID: 0-3775204546
                              • Opcode ID: b4162dfb62e50648922f0e06b0e9b62281ae8ee87d811bf77a549e15fc34c2af
                              • Instruction ID: 785ddae0d5c7b222549c9e162200417ee7e3fa4987545dd7d95f4d9bc97949a1
                              • Opcode Fuzzy Hash: b4162dfb62e50648922f0e06b0e9b62281ae8ee87d811bf77a549e15fc34c2af
                              • Instruction Fuzzy Hash: 8B8149B1D04259CFDB50CFA6D8806DEBBB1FF88314F10952AE815BB350DB709959CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 180 2aafb61-2aafb88 181 2aafb8a-2aafbac 180->181 182 2aafbec-2aafc5e 180->182 183 2aafbae-2aafbd5 181->183 184 2aafbe6-2aafbea 181->184 188 2aafc69-2aafc70 182->188 189 2aafc60-2aafc66 182->189 186 2aafbdd-2aafbde 183->186 187 2aafbd8 call 2aada04 183->187 184->182 187->186 190 2aafc7b-2aafd1a CreateWindowExW 188->190 191 2aafc72-2aafc78 188->191 189->188 193 2aafd1c-2aafd22 190->193 194 2aafd23-2aafd5b 190->194 191->190 193->194 198 2aafd68 194->198 199 2aafd5d-2aafd60 194->199 200 2aafd69 198->200 199->198 200->200
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02AAFD0A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.522770524.0000000002AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_2aa0000_remittance.jbxd
                              Similarity
                              • API ID: CreateWindow
                              • String ID: 'O*P$'O*P
                              • API String ID: 716092398-3775204546
                              • Opcode ID: ea29863cfa8a4e2cdd6a37bb6dfa9d5c58273ba4b5f9ce34744fff84d70c3d2f
                              • Instruction ID: fb40a44be89ac35a511438bec36ab1e673e4465ffadfe03597fa746ab472c8b4
                              • Opcode Fuzzy Hash: ea29863cfa8a4e2cdd6a37bb6dfa9d5c58273ba4b5f9ce34744fff84d70c3d2f
                              • Instruction Fuzzy Hash: 0B6112B2C04348AFCF06CFA5D890ACEBFB1BF49314F19816AE808AB261D7759855CF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 229 6663604-6663683 231 6663685-666368f 229->231 232 66636bc-66636ef 229->232 231->232 233 6663691-6663693 231->233 240 66636f7-6663748 DnsQuery_A 232->240 234 66636b6-66636b9 233->234 235 6663695-666369f 233->235 234->232 237 66636a3-66636b2 235->237 238 66636a1 235->238 237->237 239 66636b4 237->239 238->237 239->234 241 6663751-666379e 240->241 242 666374a-6663750 240->242 247 66637a0-66637a4 241->247 248 66637ae-66637b2 241->248 242->241 247->248 249 66637a6 247->249 250 66637b4-66637b7 248->250 251 66637c1-66637c5 248->251 249->248 250->251 252 66637d6 251->252 253 66637c7-66637d3 251->253 255 66637d7 252->255 253->252 255->255
                              APIs
                              • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06663738
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.551241841.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6660000_remittance.jbxd
                              Similarity
                              • API ID: Query_
                              • String ID: 'O*P$'O*P
                              • API String ID: 428220571-3775204546
                              • Opcode ID: 45a83a38e079fefea4534bde8b54ba76a409f2e5f857932edc04aba4ea6c7f0d
                              • Instruction ID: f39290e7d0139f80661aa5127e370f7b28b7febe802b8b66cc96eeb37abc4d55
                              • Opcode Fuzzy Hash: 45a83a38e079fefea4534bde8b54ba76a409f2e5f857932edc04aba4ea6c7f0d
                              • Instruction Fuzzy Hash: 855101B1D002588FCB50CFAAD9846DEBBB1BF48314F24912AE815BB350DB74A946CF81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 201 66618fc-6663683 204 6663685-666368f 201->204 205 66636bc-6663748 DnsQuery_A 201->205 204->205 206 6663691-6663693 204->206 214 6663751-666379e 205->214 215 666374a-6663750 205->215 207 66636b6-66636b9 206->207 208 6663695-666369f 206->208 207->205 210 66636a3-66636b2 208->210 211 66636a1 208->211 210->210 212 66636b4 210->212 211->210 212->207 220 66637a0-66637a4 214->220 221 66637ae-66637b2 214->221 215->214 220->221 222 66637a6 220->222 223 66637b4-66637b7 221->223 224 66637c1-66637c5 221->224 222->221 223->224 225 66637d6 224->225 226 66637c7-66637d3 224->226 228 66637d7 225->228 226->225 228->228
                              APIs
                              • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06663738
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.551241841.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6660000_remittance.jbxd
                              Similarity
                              • API ID: Query_
                              • String ID: 'O*P$'O*P
                              • API String ID: 428220571-3775204546
                              • Opcode ID: 6560d97c818bfb63499189ca51058bd7e55c02349e45e70e4a7ab96bf232800b
                              • Instruction ID: 48df2f16f54d3bb8eb0480abbe8e0cfd51f78a26bf5d8b9e4a15d41222f4a58f
                              • Opcode Fuzzy Hash: 6560d97c818bfb63499189ca51058bd7e55c02349e45e70e4a7ab96bf232800b
                              • Instruction Fuzzy Hash: 155102B1D002589FCB50CFAAD884ADEBBB1FF48314F24912AE815BB350DB70A945CF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 256 2aada04-2aafc5e 258 2aafc69-2aafc70 256->258 259 2aafc60-2aafc66 256->259 260 2aafc7b-2aafd1a CreateWindowExW 258->260 261 2aafc72-2aafc78 258->261 259->258 263 2aafd1c-2aafd22 260->263 264 2aafd23-2aafd5b 260->264 261->260 263->264 268 2aafd68 264->268 269 2aafd5d-2aafd60 264->269 270 2aafd69 268->270 269->268 270->270
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02AAFD0A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.522770524.0000000002AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_2aa0000_remittance.jbxd
                              Similarity
                              • API ID: CreateWindow
                              • String ID: 'O*P$'O*P
                              • API String ID: 716092398-3775204546
                              • Opcode ID: 7d1472f76e1982277042cc98947915089a9380ea0683d303f35adb7983039420
                              • Instruction ID: edfc90646aeedb40dd8546d32f29c354d6e385b6643f812b7b76ef37472d4078
                              • Opcode Fuzzy Hash: 7d1472f76e1982277042cc98947915089a9380ea0683d303f35adb7983039420
                              • Instruction Fuzzy Hash: C351BEB1D00349DFDB14CF9AD894ADEFBB5BF88314F24812AE819AB610DB759845CF90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 385 2aa93e8-2aa93fd call 2aa8704 388 2aa93ff 385->388 389 2aa9413-2aa9417 385->389 439 2aa9405 call 2aa9660 388->439 440 2aa9405 call 2aa9670 388->440 390 2aa942b-2aa946c 389->390 391 2aa9419-2aa9423 389->391 396 2aa9479-2aa9487 390->396 397 2aa946e-2aa9476 390->397 391->390 392 2aa940b-2aa940d 392->389 394 2aa9548-2aa9608 392->394 434 2aa960a-2aa960d 394->434 435 2aa9610-2aa963b GetModuleHandleW 394->435 399 2aa94ab-2aa94ad 396->399 400 2aa9489-2aa948e 396->400 397->396 403 2aa94b0-2aa94b7 399->403 401 2aa9499 400->401 402 2aa9490-2aa9497 call 2aa8710 400->402 406 2aa949b-2aa94a9 401->406 402->406 407 2aa94b9-2aa94c1 403->407 408 2aa94c4-2aa94cb 403->408 406->403 407->408 409 2aa94d8-2aa94e1 call 2aa8720 408->409 410 2aa94cd-2aa94d5 408->410 415 2aa94ee-2aa94f3 409->415 416 2aa94e3-2aa94eb 409->416 410->409 418 2aa9511-2aa9515 415->418 419 2aa94f5-2aa94fc 415->419 416->415 441 2aa9518 call 2aa9968 418->441 442 2aa9518 call 2aa9940 418->442 419->418 420 2aa94fe-2aa950e call 2aa8730 call 2aa8740 419->420 420->418 423 2aa951b-2aa951e 426 2aa9520-2aa953e 423->426 427 2aa9541-2aa9547 423->427 426->427 434->435 436 2aa963d-2aa9643 435->436 437 2aa9644-2aa9658 435->437 436->437 439->392 440->392 441->423 442->423
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02AA962E
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.522770524.0000000002AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_2aa0000_remittance.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID: 'O*P
                              • API String ID: 4139908857-1667702714
                              • Opcode ID: 9c611e8d138e3438d5cada5b5a316058d1c98bcec9dd6fcba2c84c48fef26290
                              • Instruction ID: 1182870d0e35ea5d03ab5d258ef614f4828c625da9d3d5fc282888e7f0f53048
                              • Opcode Fuzzy Hash: 9c611e8d138e3438d5cada5b5a316058d1c98bcec9dd6fcba2c84c48fef26290
                              • Instruction Fuzzy Hash: 4A7113B0A00B068FD764DF2AD59575BBBF1BF88214F008A29D48AD7A40DB74E845CF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 443 2aafe02-2aafe17 444 2aafe19-2aafe1b 443->444 445 2aafe1d-2aafe1f 443->445 444->445 446 2aafe21-2aafe23 call 2aada3c 445->446 447 2aafe25 445->447 446->447 453 2aafe27 call 2aada3c 447->453 454 2aafe27 call 2aafe02 447->454 455 2aafe27 call 2aafe10 447->455 449 2aafe28-2aafeaa SetWindowLongW 450 2aafeac-2aafeb2 449->450 451 2aafeb3-2aafec7 449->451 450->451 453->449 454->449 455->449
                              APIs
                              • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,02AAFE28,?,?,?,?), ref: 02AAFE9D
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.522770524.0000000002AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_2aa0000_remittance.jbxd
                              Similarity
                              • API ID: LongWindow
                              • String ID: 'O*P
                              • API String ID: 1378638983-1667702714
                              • Opcode ID: 0facb7ad10568a981e84323285b51a17536eb4f966dc00091a7f00355dfce931
                              • Instruction ID: 81ad930d7ef8dabd3ec7a0e5f9b7c511f1a08f190ba6a744962d1316ffbb0046
                              • Opcode Fuzzy Hash: 0facb7ad10568a981e84323285b51a17536eb4f966dc00091a7f00355dfce931
                              • Instruction Fuzzy Hash: 252168B6800248DFCB11CF95EA85BDEBBF4EF48314F09844AE858B7652D735A904CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 456 2aaa14c-2aabd94 DuplicateHandle 458 2aabd9d-2aabdba 456->458 459 2aabd96-2aabd9c 456->459 459->458
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02AABCC6,?,?,?,?,?), ref: 02AABD87
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.522770524.0000000002AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_2aa0000_remittance.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID: 'O*P
                              • API String ID: 3793708945-1667702714
                              • Opcode ID: d9042834602b7b2d32385d46d548d6ec7fa754aae077c33062828552cf3649bc
                              • Instruction ID: 9e533f17c037f09c1cb9812548cceb4e35382f6089c3b237f7a2c5f1bbd57c4c
                              • Opcode Fuzzy Hash: d9042834602b7b2d32385d46d548d6ec7fa754aae077c33062828552cf3649bc
                              • Instruction Fuzzy Hash: FE21E5B59003489FDB10CF99D984ADEBBF4EB48314F14841AE955A3310D774A954CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 462 2aabcf9-2aabd94 DuplicateHandle 463 2aabd9d-2aabdba 462->463 464 2aabd96-2aabd9c 462->464 464->463
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02AABCC6,?,?,?,?,?), ref: 02AABD87
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.522770524.0000000002AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_2aa0000_remittance.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID: 'O*P
                              • API String ID: 3793708945-1667702714
                              • Opcode ID: 0c705f961e4b037d95e5529d0bcf87bf2f7b98848741a392834efcaf15129750
                              • Instruction ID: 92ca3b738912d18ed75ae1c1972dd09b1bc35e38f446b217918ed5c421232ec1
                              • Opcode Fuzzy Hash: 0c705f961e4b037d95e5529d0bcf87bf2f7b98848741a392834efcaf15129750
                              • Instruction Fuzzy Hash: 1221E2B5900248DFDB00CFA9D984AEEBBF4EF48324F14841AE958A3310D378A955CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 467 2aa8768-2aa9890 469 2aa9898-2aa98c7 LoadLibraryExW 467->469 470 2aa9892-2aa9895 467->470 471 2aa98c9-2aa98cf 469->471 472 2aa98d0-2aa98ed 469->472 470->469 471->472
                              APIs
                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02AA96A9,00000800,00000000,00000000), ref: 02AA98BA
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.522770524.0000000002AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_2aa0000_remittance.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID: 'O*P
                              • API String ID: 1029625771-1667702714
                              • Opcode ID: 22bdeed712f559fa1aca719411337bc099e0dadb0007a91a07c888ec89902124
                              • Instruction ID: 6b8bc43900cdcc2dbafa55ada50211daae1209b7bf76a0177438ef5ab4ae20d8
                              • Opcode Fuzzy Hash: 22bdeed712f559fa1aca719411337bc099e0dadb0007a91a07c888ec89902124
                              • Instruction Fuzzy Hash: 4711D0B69002499FDB10CF9AD484BDEFBF4EB88324F14842EE919A7600C775A945CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 475 2aa9849-2aa9890 476 2aa9898-2aa98c7 LoadLibraryExW 475->476 477 2aa9892-2aa9895 475->477 478 2aa98c9-2aa98cf 476->478 479 2aa98d0-2aa98ed 476->479 477->476 478->479
                              APIs
                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02AA96A9,00000800,00000000,00000000), ref: 02AA98BA
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.522770524.0000000002AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_2aa0000_remittance.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID: 'O*P
                              • API String ID: 1029625771-1667702714
                              • Opcode ID: adb18c22f1c81082117e354dde29ee43a52cadc8589b94469d1b7691f234957c
                              • Instruction ID: 33b22196e1a5cc286b58094d91244b49b8dc5f7465b9cd4f005a434feeb37d7f
                              • Opcode Fuzzy Hash: adb18c22f1c81082117e354dde29ee43a52cadc8589b94469d1b7691f234957c
                              • Instruction Fuzzy Hash: E01112B6D002098FCB10CF9AD584BDEFBF4AF48314F05842AD419A7600C774A545CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02AA962E
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.522770524.0000000002AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_2aa0000_remittance.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID: 'O*P
                              • API String ID: 4139908857-1667702714
                              • Opcode ID: fc2a0576067e352571138bcbf56b71a123211faac22e58fe0ae95ba2ef63846a
                              • Instruction ID: 67f3621b23a1404bb6fe9faca593be763f00b7651b42e9f1bf0c02836a547707
                              • Opcode Fuzzy Hash: fc2a0576067e352571138bcbf56b71a123211faac22e58fe0ae95ba2ef63846a
                              • Instruction Fuzzy Hash: F411E0B5D002898FCB10CF9AD444BDFFBF4AF88324F14851AD859A7600D774A545CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,02AAFE28,?,?,?,?), ref: 02AAFE9D
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.522770524.0000000002AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_2aa0000_remittance.jbxd
                              Similarity
                              • API ID: LongWindow
                              • String ID: 'O*P
                              • API String ID: 1378638983-1667702714
                              • Opcode ID: 7c0d4c783daae25e3bf47109335f7b13224a8a666cc13a641d4480199582cf0d
                              • Instruction ID: 7bf3ba09def71a6ec7486fc67298b97f41ef96668dcd4b67e820b67e7787c627
                              • Opcode Fuzzy Hash: 7c0d4c783daae25e3bf47109335f7b13224a8a666cc13a641d4480199582cf0d
                              • Instruction Fuzzy Hash: 391136B18002488FCB20CF89D485BDFFBF8EB48324F10841AE918A7700C375A940CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000004.00000002.521589494.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_112d000_remittance.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b6f441b2d145578816c69e09f7d2c9095ef7f0c388f3009a91f654e43a0456b5
                              • Instruction ID: e13cb2c2364134125277a613b4434e68bcb24ffcd51411ffd33588606c830bd3
                              • Opcode Fuzzy Hash: b6f441b2d145578816c69e09f7d2c9095ef7f0c388f3009a91f654e43a0456b5
                              • Instruction Fuzzy Hash: 6B2128B1504280DFDF09CF54E9C0B66BB65FB88324F24C569E9094B647C336E866C7A2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000004.00000002.521589494.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_112d000_remittance.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dbe10acdb5d755c041459a11502ad893dee6ebef9a1fbce2e47d40bd41c1443f
                              • Instruction ID: 1e496e1bca97c23afaa3a352a403a5146df29839ccc9f1fa9f9c2d840b556083
                              • Opcode Fuzzy Hash: dbe10acdb5d755c041459a11502ad893dee6ebef9a1fbce2e47d40bd41c1443f
                              • Instruction Fuzzy Hash: C32136B1504240DFDF09CF48E9C0B26BF71FB88328F248569E9094B207C376D825CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000004.00000002.521716621.000000000113D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0113D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_113d000_remittance.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 27ed3b953bbf200a4b7af4a371e0fccf731c3e424b04b18ccb14ebd38357fd3e
                              • Instruction ID: be4801185bdaf7160e9c8aef9a05fc2e30f74d19d3bb0c71e5885f95424c1c10
                              • Opcode Fuzzy Hash: 27ed3b953bbf200a4b7af4a371e0fccf731c3e424b04b18ccb14ebd38357fd3e
                              • Instruction Fuzzy Hash: C72145B1504240DFDF19CF54E4C0B26FB61FB88764F64C569D8494B24AC336D806CB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000004.00000002.521716621.000000000113D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0113D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_113d000_remittance.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3ccccfcfbe630cf1663c604416f3e55d7c9cc7306a93c4edfb77a0fdec78483e
                              • Instruction ID: 0af0f100d59644bfc95db45a086536de2fc11470dee909993a35825f76ed39ec
                              • Opcode Fuzzy Hash: 3ccccfcfbe630cf1663c604416f3e55d7c9cc7306a93c4edfb77a0fdec78483e
                              • Instruction Fuzzy Hash: F52180754083809FCB06CF64E994B11BF71EB86214F28C5DAD8498F267C33AD85ACB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000004.00000002.521589494.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_112d000_remittance.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9d1606d3ccce243fd1f77a0f329f1b699bcc9a47d2faa991896c31d2fdfa8743
                              • Instruction ID: 33635e00f7366b558b3a9e553f787c0574c8ff441c466694f0642ef20d69f4ee
                              • Opcode Fuzzy Hash: 9d1606d3ccce243fd1f77a0f329f1b699bcc9a47d2faa991896c31d2fdfa8743
                              • Instruction Fuzzy Hash: 4311DF72804280CFDF06CF48E5C0B16BF71FB84324F2482A9D8054B217C336D466CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000004.00000002.521589494.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_112d000_remittance.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9d1606d3ccce243fd1f77a0f329f1b699bcc9a47d2faa991896c31d2fdfa8743
                              • Instruction ID: 42beaeef8a7b3bf336ec5c217c23919b6e81c9da9472784b2d52090e47406129
                              • Opcode Fuzzy Hash: 9d1606d3ccce243fd1f77a0f329f1b699bcc9a47d2faa991896c31d2fdfa8743
                              • Instruction Fuzzy Hash: AE11AF76404280CFDF16CF54E9C4B56BF71FB84324F24C6A9D8454BA16C336E46ACBA2
                              Uniqueness

                              Uniqueness Score: -1.00%