Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wzkp8c4Z3F.exe

Overview

General Information

Sample Name:wzkp8c4Z3F.exe
Analysis ID:708261
MD5:c143cac623fbf082adedd43cad691a69
SHA1:62bd3d43d6e897922cf557d4e40f7d6d9035a4bf
SHA256:3a542858ddb263f3b60a1c7340d508e7f392443e9ee8521d0c9e4a8289173fdf
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • wzkp8c4Z3F.exe (PID: 5336 cmdline: "C:\Users\user\Desktop\wzkp8c4Z3F.exe" MD5: C143CAC623FBF082ADEDD43CAD691A69)
    • wzkp8c4Z3F.exe (PID: 6004 cmdline: C:\Users\user\Desktop\wzkp8c4Z3F.exe MD5: C143CAC623FBF082ADEDD43CAD691A69)
      • schtasks.exe (PID: 5180 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDBD9.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 4596 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpF6C5.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5248 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • wzkp8c4Z3F.exe (PID: 1544 cmdline: C:\Users\user\Desktop\wzkp8c4Z3F.exe 0 MD5: C143CAC623FBF082ADEDD43CAD691A69)
    • wzkp8c4Z3F.exe (PID: 3104 cmdline: C:\Users\user\Desktop\wzkp8c4Z3F.exe MD5: C143CAC623FBF082ADEDD43CAD691A69)
  • dhcpmon.exe (PID: 2004 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: C143CAC623FBF082ADEDD43CAD691A69)
    • dhcpmon.exe (PID: 6060 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: C143CAC623FBF082ADEDD43CAD691A69)
  • dhcpmon.exe (PID: 5528 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: C143CAC623FBF082ADEDD43CAD691A69)
    • dhcpmon.exe (PID: 5000 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: C143CAC623FBF082ADEDD43CAD691A69)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "9c6d4c8a-884b-4287-8ce0-7edf4a23", "Group": "X File", "Domain1": "jasonbourne.bounceme.net", "Domain2": "127.0.0.1", "Port": 4032, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xf7ad:$x1: NanoCore.ClientPluginHost
  • 0xf7da:$x2: IClientNetworkHost
00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xf7ad:$x2: NanoCore.ClientPluginHost
  • 0x10888:$s4: PipeCreated
  • 0xf7c7:$s5: IClientLoggingHost
00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0xf778:$x2: NanoCore.ClientPlugin
    • 0xf7ad:$x3: NanoCore.ClientPluginHost
    • 0xf76c:$i2: IClientData
    • 0xf78e:$i3: IClientNetwork
    • 0xf79d:$i5: IClientDataHost
    • 0xf7c7:$i6: IClientLoggingHost
    • 0xf7da:$i7: IClientNetworkHost
    • 0xf7ed:$i8: IClientUIHost
    • 0xf7fb:$i9: IClientNameObjectCollection
    • 0xf817:$i10: IClientReadOnlyNameObjectCollection
    • 0xf56a:$s1: ClientPlugin
    • 0xf781:$s1: ClientPlugin
    • 0x147a2:$s6: get_ClientSettings
    00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xf7ad:$a1: NanoCore.ClientPluginHost
    • 0xf778:$a2: NanoCore.ClientPlugin
    • 0x146f3:$b1: get_BuilderSettings
    • 0x14662:$b7: LogClientException
    • 0xf7c7:$b9: IClientLoggingHost
    Click to see the 100 entries
    SourceRuleDescriptionAuthorStrings
    1.2.wzkp8c4Z3F.exe.3354670.2.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x6da5:$x1: NanoCore.ClientPluginHost
    • 0x6dd2:$x2: IClientNetworkHost
    1.2.wzkp8c4Z3F.exe.3354670.2.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x6da5:$x2: NanoCore.ClientPluginHost
    • 0x7d74:$s2: FileCommand
    • 0xc776:$s4: PipeCreated
    • 0x6dbf:$s5: IClientLoggingHost
    1.2.wzkp8c4Z3F.exe.3354670.2.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0x6d7f:$x2: NanoCore.ClientPlugin
    • 0x6da5:$x3: NanoCore.ClientPluginHost
    • 0x6d70:$i3: IClientNetwork
    • 0x6d95:$i5: IClientDataHost
    • 0x6dbf:$i6: IClientLoggingHost
    • 0x6dd2:$i7: IClientNetworkHost
    • 0x6de5:$i9: IClientNameObjectCollection
    • 0x6b02:$s1: ClientPlugin
    • 0x6d88:$s1: ClientPlugin
    1.2.wzkp8c4Z3F.exe.3354670.2.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x6da5:$a1: NanoCore.ClientPluginHost
    • 0x6d7f:$a2: NanoCore.ClientPlugin
    • 0x6dbf:$b9: IClientLoggingHost
    11.2.wzkp8c4Z3F.exe.2ea9588.0.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    Click to see the 291 entries

    AV Detection

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\wzkp8c4Z3F.exe, ProcessId: 6004, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\wzkp8c4Z3F.exe, ProcessId: 6004, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Persistence and Installation Behavior

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDBD9.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDBD9.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\wzkp8c4Z3F.exe, ParentImage: C:\Users\user\Desktop\wzkp8c4Z3F.exe, ParentProcessId: 6004, ParentProcessName: wzkp8c4Z3F.exe, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDBD9.tmp, ProcessId: 5180, ProcessName: schtasks.exe

    Stealing of Sensitive Information

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\wzkp8c4Z3F.exe, ProcessId: 6004, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\wzkp8c4Z3F.exe, ProcessId: 6004, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
    Timestamp:192.168.2.579.110.62.1874972340322816766 09/23/22-08:28:03.841045
    SID:2816766
    Source Port:49723
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874970540322025019 09/23/22-08:27:08.890440
    SID:2025019
    Source Port:49705
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:79.110.62.187192.168.2.54032497062810290 09/23/22-08:27:17.892341
    SID:2810290
    Source Port:4032
    Destination Port:49706
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:79.110.62.187192.168.2.54032497012841753 09/23/22-08:26:43.565182
    SID:2841753
    Source Port:4032
    Destination Port:49701
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874970740322816766 09/23/22-08:27:27.538615
    SID:2816766
    Source Port:49707
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:79.110.62.187192.168.2.54032497042841753 09/23/22-08:26:57.404411
    SID:2841753
    Source Port:4032
    Destination Port:49704
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874970440322816766 09/23/22-08:26:53.398294
    SID:2816766
    Source Port:49704
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874972440322025019 09/23/22-08:28:10.108277
    SID:2025019
    Source Port:49724
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874970640322816718 09/23/22-08:27:18.571667
    SID:2816718
    Source Port:49706
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874971740322816766 09/23/22-08:27:45.797275
    SID:2816766
    Source Port:49717
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874972040322816766 09/23/22-08:27:53.992917
    SID:2816766
    Source Port:49720
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:79.110.62.187192.168.2.54032497242841753 09/23/22-08:28:35.213011
    SID:2841753
    Source Port:4032
    Destination Port:49724
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874970040322816766 09/23/22-08:26:32.618302
    SID:2816766
    Source Port:49700
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874970140322025019 09/23/22-08:26:38.525077
    SID:2025019
    Source Port:49701
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874970040322025019 09/23/22-08:26:30.256524
    SID:2025019
    Source Port:49700
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874970540322816766 09/23/22-08:27:09.489809
    SID:2816766
    Source Port:49705
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874970740322025019 09/23/22-08:27:25.994008
    SID:2025019
    Source Port:49707
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874971740322025019 09/23/22-08:27:44.656647
    SID:2025019
    Source Port:49717
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874972040322025019 09/23/22-08:27:52.410331
    SID:2025019
    Source Port:49720
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874972340322025019 09/23/22-08:28:02.603420
    SID:2025019
    Source Port:49723
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874970440322025019 09/23/22-08:26:52.369313
    SID:2025019
    Source Port:49704
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874970140322816766 09/23/22-08:26:43.252402
    SID:2816766
    Source Port:49701
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874970640322025019 09/23/22-08:27:16.819903
    SID:2025019
    Source Port:49706
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874971640322025019 09/23/22-08:27:34.502399
    SID:2025019
    Source Port:49716
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874971640322816766 09/23/22-08:27:36.333232
    SID:2816766
    Source Port:49716
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.579.110.62.1874970640322816766 09/23/22-08:27:18.571667
    SID:2816766
    Source Port:49706
    Destination Port:4032
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: wzkp8c4Z3F.exeReversingLabs: Detection: 30%
    Source: wzkp8c4Z3F.exeVirustotal: Detection: 37%Perma Link
    Source: jasonbourne.bounceme.netAvira URL Cloud: Label: malware
    Source: jasonbourne.bounceme.netVirustotal: Detection: 20%Perma Link
    Source: jasonbourne.bounceme.netVirustotal: Detection: 20%Perma Link
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 30%
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.5a14629.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e8b7de.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.47245e0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.47245e0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.5a10000.20.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e90614.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.46efbc0.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e90614.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.5a10000.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e94c3d.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.4489064.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.447cc37.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.447780c.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.46625a0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000000.318787004.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.431374912.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.427695686.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: wzkp8c4Z3F.exe PID: 5336, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: wzkp8c4Z3F.exe PID: 6004, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: wzkp8c4Z3F.exe PID: 3104, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6060, type: MEMORYSTR
    Source: 1.2.wzkp8c4Z3F.exe.5a10000.20.unpackAvira: Label: TR/NanoCore.fadte
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "9c6d4c8a-884b-4287-8ce0-7edf4a23", "Group": "X File", "Domain1": "jasonbourne.bounceme.net", "Domain2": "127.0.0.1", "Port": 4032, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
    Source: wzkp8c4Z3F.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: wzkp8c4Z3F.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: wzkp8c4Z3F.exe, 00000001.00000002.595560442.00000000075E0000.00000004.08000000.00040000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: wzkp8c4Z3F.exe, 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: wzkp8c4Z3F.exe, 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp

    Networking

    barindex
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49700 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49700 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49701 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49701 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 79.110.62.187:4032 -> 192.168.2.5:49701
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49704 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49704 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 79.110.62.187:4032 -> 192.168.2.5:49704
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49705 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49705 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49706 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49706 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 79.110.62.187:4032 -> 192.168.2.5:49706
    Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.5:49706 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49707 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49707 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49716 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49716 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49717 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49717 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49720 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49720 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49723 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49723 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49724 -> 79.110.62.187:4032
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 79.110.62.187:4032 -> 192.168.2.5:49724
    Source: Malware configuration extractorURLs: jasonbourne.bounceme.net
    Source: Malware configuration extractorURLs: 127.0.0.1
    Source: Joe Sandbox ViewASN Name: LASOTELFR LASOTELFR
    Source: global trafficTCP traffic: 192.168.2.5:49700 -> 79.110.62.187:4032
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://google.com
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: wzkp8c4Z3F.exe, 00000000.00000003.320875715.00000000061C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agfamonotype.7
    Source: wzkp8c4Z3F.exe, 00000000.00000003.305091252.00000000061D3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306739275.00000000061E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306739275.00000000061E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.htmllkA
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: wzkp8c4Z3F.exe, 00000000.00000003.308440589.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308655841.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308472746.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308509585.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309431649.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308685842.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309363707.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309401237.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308384890.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309507837.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309478215.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309603550.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308722684.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308883091.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308414612.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308800633.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308547019.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308618210.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308758634.00000000061E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: wzkp8c4Z3F.exe, 00000000.00000003.309247140.00000000061E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html.
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: wzkp8c4Z3F.exe, 00000000.00000003.309325259.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309581492.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309384782.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309491636.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309448912.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309157104.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309226287.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309265537.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309355591.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309106000.00000000061D4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309413300.00000000061D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frer
    Source: wzkp8c4Z3F.exe, 00000000.00000003.308781029.00000000061D4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308868619.00000000061D4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308741845.00000000061D4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308706862.00000000061D4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
    Source: wzkp8c4Z3F.exe, 00000000.00000003.308722684.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308758634.00000000061E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmlp
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: wzkp8c4Z3F.exe, 00000000.00000003.309478215.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309603550.00000000061E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comals
    Source: wzkp8c4Z3F.exe, 00000000.00000003.308758634.00000000061E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
    Source: wzkp8c4Z3F.exe, 00000000.00000003.308316786.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308440589.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308655841.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308472746.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308509585.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308685842.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308384890.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308722684.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308883091.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308414612.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308800633.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308547019.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308618210.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308758634.00000000061E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comditam
    Source: wzkp8c4Z3F.exe, 00000000.00000003.308440589.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308655841.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308472746.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308509585.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308685842.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308384890.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308414612.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308547019.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308618210.00000000061E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdsed
    Source: wzkp8c4Z3F.exe, 00000000.00000003.308440589.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308655841.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308472746.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308509585.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308685842.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308722684.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308883091.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308414612.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308800633.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308547019.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308618210.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308758634.00000000061E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.come.com
    Source: wzkp8c4Z3F.exe, 00000000.00000003.309271343.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309333675.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309247140.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309431649.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309126522.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309363707.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309401237.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309507837.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309478215.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309603550.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309176051.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308883091.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308800633.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308758634.00000000061E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgrita
    Source: wzkp8c4Z3F.exe, 00000000.00000003.320875715.00000000061C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgrito
    Source: wzkp8c4Z3F.exe, 00000000.00000003.320875715.00000000061C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comice
    Source: wzkp8c4Z3F.exe, 00000000.00000003.309603550.00000000061E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comitu
    Source: wzkp8c4Z3F.exe, 00000000.00000003.308883091.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308800633.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308758634.00000000061E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comkz
    Source: wzkp8c4Z3F.exe, 00000000.00000003.320875715.00000000061C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.como5
    Source: wzkp8c4Z3F.exe, 00000000.00000003.308722684.00000000061E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comonyd5
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
    Source: wzkp8c4Z3F.exe, 00000000.00000003.304054048.00000000061C2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: wzkp8c4Z3F.exe, 00000000.00000003.304054048.00000000061C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnTF
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: wzkp8c4Z3F.exe, 00000000.00000003.310369108.00000000061E0000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.310729246.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.310621004.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.310507059.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.310541533.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.310779336.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: wzkp8c4Z3F.exe, 00000000.00000003.307742871.00000000061CF000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307785731.00000000061CF000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307699640.00000000061D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.itcfonts.
    Source: wzkp8c4Z3F.exe, 00000000.00000003.305837903.00000000061E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307217947.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306992321.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307093650.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306922624.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307141741.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307022088.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306777523.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306816461.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305932536.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306739275.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305890213.00000000061DF000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307249023.00000000061E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/5
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306055723.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/H
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306055723.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305932536.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305890213.00000000061DF000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305837903.00000000061E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Q
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306055723.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307217947.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306992321.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307093650.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306922624.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307141741.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307022088.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306777523.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306816461.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305932536.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306739275.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305890213.00000000061DF000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307249023.00000000061E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0r1
    Source: wzkp8c4Z3F.exe, 00000000.00000003.305932536.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305890213.00000000061DF000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305837903.00000000061E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0r:
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0x
    Source: wzkp8c4Z3F.exe, 00000000.00000003.305837903.00000000061E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/en-u
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306055723.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305932536.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305890213.00000000061DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306055723.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305837903.00000000061E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/5
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306055723.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307217947.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307469242.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306992321.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307093650.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306922624.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308002992.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307299426.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307348154.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307721792.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307546287.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307963280.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307141741.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307022088.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306777523.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307761958.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306816461.00000000061E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/C
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306922624.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306777523.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306816461.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306739275.00000000061E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/Q
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306055723.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/z
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307217947.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307469242.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306992321.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307093650.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306922624.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307299426.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307348154.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307721792.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307546287.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307141741.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307022088.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306777523.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307761958.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306816461.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307816382.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307667530.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306739275.00000000061E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/liqu
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306992321.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307093650.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306922624.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307022088.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306777523.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306816461.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306739275.00000000061E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/m
    Source: wzkp8c4Z3F.exe, 00000000.00000003.301281997.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
    Source: wzkp8c4Z3F.exe, 00000000.00000003.306621636.00000000061D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com-e0$
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: unknownDNS traffic detected: queries for: jasonbourne.bounceme.net
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.5a14629.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e8b7de.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.47245e0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.47245e0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.5a10000.20.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e90614.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.46efbc0.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e90614.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.5a10000.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e94c3d.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.4489064.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.447cc37.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.447780c.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.46625a0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000000.318787004.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.431374912.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.427695686.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: wzkp8c4Z3F.exe PID: 5336, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: wzkp8c4Z3F.exe PID: 6004, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: wzkp8c4Z3F.exe PID: 3104, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6060, type: MEMORYSTR

    System Summary

    barindex
    Source: 1.2.wzkp8c4Z3F.exe.3354670.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.3354670.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.3354670.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 11.2.wzkp8c4Z3F.exe.2ea9588.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 11.2.wzkp8c4Z3F.exe.2ea9588.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 11.2.wzkp8c4Z3F.exe.2ea9588.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.7330000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.7330000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.7330000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.5a14629.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.5a14629.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.5a14629.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.7780000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.7780000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.7780000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 11.2.wzkp8c4Z3F.exe.3e8b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 11.2.wzkp8c4Z3F.exe.3e8b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 11.2.wzkp8c4Z3F.exe.3e8b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 11.2.wzkp8c4Z3F.exe.3e8b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.447cc37.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.447cc37.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.447cc37.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.42c9930.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.42c9930.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.42c9930.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.7630000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.7630000.30.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.7630000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.443ef21.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.443ef21.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.443ef21.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.77b4c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.77b4c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.77b4c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.5c70000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.4620d7e.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.5c70000.23.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.4620d7e.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.4620d7e.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.5c70000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.7a70000.36.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.7a70000.36.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.7a70000.36.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.444b155.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.444b155.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.444b155.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.461294e.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.461294e.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.461294e.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.77a0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.77a0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.77a0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.7610000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.7610000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.7610000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.5a10000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.5a10000.20.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.5a10000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.4620d7e.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.4620d7e.16.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.4620d7e.16.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.5c80000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.5c80000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.5c80000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 11.2.wzkp8c4Z3F.exe.3e90614.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 11.2.wzkp8c4Z3F.exe.3e90614.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 11.2.wzkp8c4Z3F.exe.3e90614.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.5c70000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.5c70000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.5c70000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.75e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.75e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.75e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.77be8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.77be8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.77be8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.5c80000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.5c80000.24.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.5c80000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.wzkp8c4Z3F.exe.46efbc0.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.wzkp8c4Z3F.exe.46efbc0.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.wzkp8c4Z3F.exe.46efbc0.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.wzkp8c4Z3F.exe.46efbc0.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.75e0000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.75e0000.26.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.75e0000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.7600000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.7600000.27.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.7600000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.77a0000.32.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.77a0000.32.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.77a0000.32.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.77b0000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.77b0000.34.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.77b0000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.3336334.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.3336334.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.3336334.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.7600000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.7600000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.7600000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 11.2.wzkp8c4Z3F.exe.3e90614.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 11.2.wzkp8c4Z3F.exe.3e90614.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 11.2.wzkp8c4Z3F.exe.3e90614.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.444b155.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.444b155.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.444b155.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.42d81d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.42d81d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.42d81d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.7630000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.7630000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.7630000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.443ef21.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.443ef21.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.443ef21.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.7620000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.7620000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.7620000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.42ce5cf.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.42ce5cf.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.42ce5cf.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.5a00000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.5a00000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.5a00000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.7780000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.7780000.31.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.7780000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.7a70000.36.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.7a70000.36.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.7a70000.36.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.5a10000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.5a10000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.5a10000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 11.2.wzkp8c4Z3F.exe.3e94c3d.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 11.2.wzkp8c4Z3F.exe.3e94c3d.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 11.2.wzkp8c4Z3F.exe.3e94c3d.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.3354670.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.3354670.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.3354670.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.wzkp8c4Z3F.exe.3354670.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 12.2.dhcpmon.exe.2c89684.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.dhcpmon.exe.2c89684.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 12.2.dhcpmon.exe.2c89684.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.461294e.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.461294e.18.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.461294e.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.445f782.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.445f782.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.445f782.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.42c9930.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.42c9930.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.42c9930.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.77b0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.77b0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.77b0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.7620000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.7620000.29.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.7620000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.451de19.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.451de19.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.451de19.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.wzkp8c4Z3F.exe.451de19.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.447cc37.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.447cc37.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.447cc37.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.wzkp8c4Z3F.exe.447cc37.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.452a673.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.447780c.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.3310ac0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.3336334.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.wzkp8c4Z3F.exe.3310ac0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.3310ac0.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.wzkp8c4Z3F.exe.3310ac0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.452a673.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.452a673.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.wzkp8c4Z3F.exe.452a673.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.3336334.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.3336334.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.wzkp8c4Z3F.exe.3336334.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.wzkp8c4Z3F.exe.447780c.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.wzkp8c4Z3F.exe.447780c.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.wzkp8c4Z3F.exe.447780c.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.wzkp8c4Z3F.exe.46625a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.wzkp8c4Z3F.exe.46625a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
    Source: 0.2.wzkp8c4Z3F.exe.46625a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.wzkp8c4Z3F.exe.46625a0.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.wzkp8c4Z3F.exe.46625a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000000.318787004.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000000.318787004.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000001.00000000.318787004.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.587604607.0000000005C80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.587604607.0000000005C80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.587604607.0000000005C80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.597276168.0000000007A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.597276168.0000000007A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.597276168.0000000007A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.595560442.00000000075E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.595560442.00000000075E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.595560442.00000000075E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.596333698.0000000007780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.596333698.0000000007780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.596333698.0000000007780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000003.358154679.000000000172E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.596606327.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.596606327.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.596606327.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.577659680.00000000042C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.596732046.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.596732046.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.596732046.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000C.00000002.431374912.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.431374912.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.586144489.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.586144489.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.586144489.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000B.00000002.427695686.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000B.00000002.427695686.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.587474125.0000000005C70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.587474125.0000000005C70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.587474125.0000000005C70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 5336, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 5336, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 5336, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 6004, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 6004, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 6004, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 3104, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 3104, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: dhcpmon.exe PID: 6060, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 6060, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: wzkp8c4Z3F.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 1.2.wzkp8c4Z3F.exe.3354670.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.3354670.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.3354670.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.3354670.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 11.2.wzkp8c4Z3F.exe.2ea9588.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.wzkp8c4Z3F.exe.2ea9588.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.wzkp8c4Z3F.exe.2ea9588.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 11.2.wzkp8c4Z3F.exe.2ea9588.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.7330000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7330000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7330000.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.7330000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.5a14629.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5a14629.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5a14629.21.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.5a14629.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.7780000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7780000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7780000.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.7780000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 11.2.wzkp8c4Z3F.exe.3e8b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.wzkp8c4Z3F.exe.3e8b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.wzkp8c4Z3F.exe.3e8b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 11.2.wzkp8c4Z3F.exe.3e8b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 11.2.wzkp8c4Z3F.exe.3e8b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.447cc37.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.447cc37.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.447cc37.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.447cc37.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.42c9930.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.42c9930.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.42c9930.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.42c9930.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.7630000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7630000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7630000.30.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.7630000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.443ef21.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.443ef21.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.443ef21.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.443ef21.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.77b4c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.77b4c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.77b4c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.77b4c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.wzkp8c4Z3F.exe.47245e0.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.5c70000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5c70000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4620d7e.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4620d7e.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5c70000.23.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.4620d7e.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.4620d7e.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.5c70000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.4609b1f.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.7a70000.36.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7a70000.36.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7a70000.36.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.7a70000.36.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.444b155.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.444b155.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.444b155.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.444b155.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.461294e.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.461294e.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.461294e.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.461294e.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.77a0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.77a0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.77a0000.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.77a0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.7610000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7610000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7610000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.7610000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.5a10000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5a10000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5a10000.20.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.5a10000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.4620d7e.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4620d7e.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4620d7e.16.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.4620d7e.16.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.5c80000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5c80000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5c80000.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.5c80000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 11.2.wzkp8c4Z3F.exe.3e90614.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.wzkp8c4Z3F.exe.3e90614.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.wzkp8c4Z3F.exe.3e90614.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 11.2.wzkp8c4Z3F.exe.3e90614.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.5c70000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5c70000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5c70000.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.5c70000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.75e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.75e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.75e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.75e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.77be8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.77be8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.77be8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.77be8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.5c80000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5c80000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5c80000.24.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.5c80000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.wzkp8c4Z3F.exe.46efbc0.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.wzkp8c4Z3F.exe.46efbc0.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.wzkp8c4Z3F.exe.46efbc0.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.wzkp8c4Z3F.exe.46efbc0.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.75e0000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.75e0000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.75e0000.26.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.75e0000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.7600000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7600000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7600000.27.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.7600000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.77a0000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.77a0000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.77a0000.32.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.77a0000.32.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.77b0000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.77b0000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.77b0000.34.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.77b0000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.3336334.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.3336334.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.3336334.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.3336334.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.7600000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7600000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7600000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.7600000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 11.2.wzkp8c4Z3F.exe.3e90614.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.wzkp8c4Z3F.exe.3e90614.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.wzkp8c4Z3F.exe.3e90614.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 11.2.wzkp8c4Z3F.exe.3e90614.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.4523845.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.444b155.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.444b155.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.444b155.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.444b155.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.42d81d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.42d81d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.42d81d4.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.42d81d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.7630000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7630000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7630000.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.7630000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.443ef21.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.443ef21.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.443ef21.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.443ef21.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.7620000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7620000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7620000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.7620000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.42ce5cf.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.42ce5cf.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.42ce5cf.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.42ce5cf.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.5a00000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5a00000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5a00000.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.5a00000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.7780000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7780000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7780000.31.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.7780000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.7a70000.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7a70000.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7a70000.36.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.7a70000.36.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.5a10000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5a10000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.5a10000.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.5a10000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 11.2.wzkp8c4Z3F.exe.3e94c3d.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.wzkp8c4Z3F.exe.3e94c3d.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.wzkp8c4Z3F.exe.3e94c3d.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 11.2.wzkp8c4Z3F.exe.3e94c3d.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.3354670.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.3354670.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.3354670.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.3354670.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 12.2.dhcpmon.exe.2c89684.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 12.2.dhcpmon.exe.2c89684.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 12.2.dhcpmon.exe.2c89684.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 12.2.dhcpmon.exe.2c89684.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.461294e.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.461294e.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.461294e.18.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.461294e.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.445f782.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.445f782.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.445f782.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.445f782.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.42c9930.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.42c9930.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.42c9930.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.42c9930.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.4489064.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.77b0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.77b0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.77b0000.34.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.77b0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.7620000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7620000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.7620000.29.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.7620000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.451de19.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.451de19.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.451de19.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.451de19.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.451de19.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.447cc37.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.447cc37.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.447cc37.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.447cc37.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.452a673.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.452a673.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.447780c.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.3310ac0.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.3336334.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.wzkp8c4Z3F.exe.3310ac0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.3310ac0.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.3310ac0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.452a673.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.452a673.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.452a673.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.3336334.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.3336334.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.3336334.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.wzkp8c4Z3F.exe.447780c.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.447780c.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.wzkp8c4Z3F.exe.447780c.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.wzkp8c4Z3F.exe.46625a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.wzkp8c4Z3F.exe.46625a0.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
    Source: 0.2.wzkp8c4Z3F.exe.46625a0.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.wzkp8c4Z3F.exe.46625a0.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.wzkp8c4Z3F.exe.46625a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000000.318787004.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000000.318787004.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000001.00000000.318787004.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.587604607.0000000005C80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.587604607.0000000005C80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.587604607.0000000005C80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.587604607.0000000005C80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.597276168.0000000007A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.597276168.0000000007A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.597276168.0000000007A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.597276168.0000000007A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.595560442.00000000075E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.595560442.00000000075E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.595560442.00000000075E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.595560442.00000000075E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.596333698.0000000007780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.596333698.0000000007780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.596333698.0000000007780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.596333698.0000000007780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000003.358154679.000000000172E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.596606327.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.596606327.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.596606327.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.596606327.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.577659680.00000000042C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.596732046.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.596732046.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.596732046.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.596732046.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000C.00000002.431374912.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.431374912.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.586144489.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.586144489.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.586144489.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.586144489.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000B.00000002.427695686.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000B.00000002.427695686.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.587474125.0000000005C70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.587474125.0000000005C70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.587474125.0000000005C70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.587474125.0000000005C70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 5336, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 5336, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 5336, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 6004, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 6004, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 6004, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 3104, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: wzkp8c4Z3F.exe PID: 3104, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: dhcpmon.exe PID: 6060, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 6060, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeCode function: 0_2_016EC174
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeCode function: 0_2_016EE76A
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeCode function: 0_2_016EE778
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeCode function: 1_2_0160E471
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeCode function: 1_2_0160E480
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeCode function: 1_2_0160BBD4
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeCode function: 1_2_0575F5F8
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeCode function: 1_2_05759788
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeCode function: 1_2_0575A610
    Source: wzkp8c4Z3F.exe, 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000000.00000002.324065690.000000000342B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000000.00000000.298530449.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNBGh.exeF vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000000.00000002.325862323.0000000004371000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000000.00000002.323461865.0000000003371000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000000.00000002.346397404.0000000007A30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000000.00000002.323991348.0000000003422000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.595560442.00000000075E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.596333698.0000000007780000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.596686089.00000000077A8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000003.326034962.00000000016E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNBGh.exeF vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.597364841.0000000007A7E000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000003.358154679.000000000172E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.566272214.000000000165A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.597016385.00000000077D8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.596732046.00000000077B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.596732046.00000000077B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.577659680.00000000042C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.577659680.00000000042C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.577659680.00000000042C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000005.00000002.388854161.0000000003FF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000005.00000002.388280818.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000005.00000002.387123617.0000000002E4F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 00000005.00000002.389150719.000000000418F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 0000000B.00000002.427695686.0000000002E41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 0000000B.00000002.427695686.0000000002E41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exe, 0000000B.00000002.424882627.00000000011D9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exeBinary or memory string: OriginalFilenameNBGh.exeF vs wzkp8c4Z3F.exe
    Source: wzkp8c4Z3F.exeReversingLabs: Detection: 30%
    Source: wzkp8c4Z3F.exeVirustotal: Detection: 37%
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeFile read: C:\Users\user\Desktop\wzkp8c4Z3F.exeJump to behavior
    Source: wzkp8c4Z3F.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Users\user\Desktop\wzkp8c4Z3F.exe "C:\Users\user\Desktop\wzkp8c4Z3F.exe"
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess created: C:\Users\user\Desktop\wzkp8c4Z3F.exe C:\Users\user\Desktop\wzkp8c4Z3F.exe
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDBD9.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Users\user\Desktop\wzkp8c4Z3F.exe C:\Users\user\Desktop\wzkp8c4Z3F.exe 0
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpF6C5.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess created: C:\Users\user\Desktop\wzkp8c4Z3F.exe C:\Users\user\Desktop\wzkp8c4Z3F.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess created: C:\Users\user\Desktop\wzkp8c4Z3F.exe C:\Users\user\Desktop\wzkp8c4Z3F.exe
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDBD9.tmp
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpF6C5.tmp
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess created: C:\Users\user\Desktop\wzkp8c4Z3F.exe C:\Users\user\Desktop\wzkp8c4Z3F.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wzkp8c4Z3F.exe.logJump to behavior
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDBD9.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.evad.winEXE@18/12@12/1
    Source: wzkp8c4Z3F.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4484:120:WilError_01
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{9c6d4c8a-884b-4287-8ce0-7edf4a237b07}
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5248:120:WilError_01
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
    Source: wzkp8c4Z3F.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: wzkp8c4Z3F.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: wzkp8c4Z3F.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: wzkp8c4Z3F.exe, 00000001.00000002.595560442.00000000075E0000.00000004.08000000.00040000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: wzkp8c4Z3F.exe, 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: wzkp8c4Z3F.exe, 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: wzkp8c4Z3F.exe, order_management_system.cs.Net Code: ResourceTemplateDefine System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 0.0.wzkp8c4Z3F.exe.e10000.0.unpack, order_management_system.cs.Net Code: ResourceTemplateDefine System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: dhcpmon.exe.1.dr, order_management_system.cs.Net Code: ResourceTemplateDefine System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeCode function: 1_2_057569F8 pushad ; retf
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeCode function: 1_2_05756A00 push esp; retf
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeCode function: 1_2_0575B5E0 push eax; retf
    Source: wzkp8c4Z3F.exeStatic PE information: 0x9CFBFE9A [Tue Jun 17 08:06:50 2053 UTC]
    Source: initial sampleStatic PE information: section name: .text entropy: 6.928377089378491
    Source: initial sampleStatic PE information: section name: .text entropy: 6.928377089378491
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDBD9.tmp

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeFile opened: C:\Users\user\Desktop\wzkp8c4Z3F.exe:Zone.Identifier read attributes | delete
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: Yara matchFile source: 00000000.00000002.323700911.00000000033BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.398660819.000000000344F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: wzkp8c4Z3F.exe PID: 5336, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2004, type: MEMORYSTR
    Source: wzkp8c4Z3F.exe, 00000000.00000002.323700911.00000000033BF000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000005.00000002.387434116.0000000002E63000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000008.00000002.398660819.000000000344F000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000009.00000002.412102216.0000000003383000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
    Source: wzkp8c4Z3F.exe, 00000000.00000002.323700911.00000000033BF000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000008.00000002.398660819.000000000344F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exe TID: 4584Thread sleep time: -41226s >= -30000s
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exe TID: 3804Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exe TID: 4348Thread sleep time: -11990383647911201s >= -30000s
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exe TID: 4180Thread sleep time: -41226s >= -30000s
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exe TID: 2764Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1716Thread sleep time: -41226s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5488Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5460Thread sleep time: -41226s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5300Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exe TID: 3388Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4508Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4976Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWindow / User API: threadDelayed 9536
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess information queried: ProcessInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeThread delayed: delay time: 41226
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeThread delayed: delay time: 41226
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41226
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41226
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: dhcpmon.exe, 00000008.00000002.398660819.000000000344F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II6VirtualBox Graphics Adapter2VM Additions S3 Trio32/64
    Source: dhcpmon.exe, 00000008.00000002.398660819.000000000344F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
    Source: wzkp8c4Z3F.exe, 00000001.00000002.567303598.00000000016EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllFS
    Source: dhcpmon.exe, 00000009.00000002.412102216.0000000003383000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE6HARDWARE\Description\System VideoBiosVersion
    Source: dhcpmon.exe, 00000009.00000002.412102216.0000000003383000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware"SystemBiosVersion
    Source: dhcpmon.exe, 00000008.00000002.398660819.000000000344F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\Settings$Device DescriptionTSOFTWARE\Oracle\VirtualBox Guest AdditionsDSOFTWARE\VMware, Inc.\VMware Tools
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeMemory written: C:\Users\user\Desktop\wzkp8c4Z3F.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeMemory written: C:\Users\user\Desktop\wzkp8c4Z3F.exe base: 400000 value starts with: 4D5A
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess created: C:\Users\user\Desktop\wzkp8c4Z3F.exe C:\Users\user\Desktop\wzkp8c4Z3F.exe
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDBD9.tmp
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpF6C5.tmp
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeProcess created: C:\Users\user\Desktop\wzkp8c4Z3F.exe C:\Users\user\Desktop\wzkp8c4Z3F.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: wzkp8c4Z3F.exe, 00000001.00000002.574946686.000000000360D000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.576473242.00000000036FB000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.577530652.000000000378F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager(
    Source: wzkp8c4Z3F.exe, 00000001.00000002.572141846.0000000003479000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.576840170.0000000003731000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.572098535.0000000003475000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: wzkp8c4Z3F.exe, 00000001.00000002.597239292.000000000792E000.00000004.00000010.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.588072873.000000000675B000.00000004.00000010.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.598697374.000000000932D000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
    Source: wzkp8c4Z3F.exe, 00000001.00000002.573652167.0000000003563000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager4
    Source: wzkp8c4Z3F.exe, 00000001.00000002.597698670.00000000083DB000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Users\user\Desktop\wzkp8c4Z3F.exe VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Users\user\Desktop\wzkp8c4Z3F.exe VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Users\user\Desktop\wzkp8c4Z3F.exe VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Users\user\Desktop\wzkp8c4Z3F.exe VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\wzkp8c4Z3F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.5a14629.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e8b7de.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.47245e0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.47245e0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.5a10000.20.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e90614.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.46efbc0.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e90614.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.5a10000.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e94c3d.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.4489064.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.447cc37.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.447780c.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.46625a0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000000.318787004.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.431374912.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.427695686.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: wzkp8c4Z3F.exe PID: 5336, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: wzkp8c4Z3F.exe PID: 6004, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: wzkp8c4Z3F.exe PID: 3104, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6060, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: wzkp8c4Z3F.exe, 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000000.318787004.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.597276168.0000000007A70000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.595560442.00000000075E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.596333698.0000000007780000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: wzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: wzkp8c4Z3F.exe, 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: wzkp8c4Z3F.exe, 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: wzkp8c4Z3F.exe, 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: wzkp8c4Z3F.exe, 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: wzkp8c4Z3F.exe, 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: wzkp8c4Z3F.exe, 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: wzkp8c4Z3F.exe, 00000001.00000003.358154679.000000000172E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: wzkp8c4Z3F.exe, 00000001.00000002.596606327.00000000077A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.596732046.00000000077B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.577659680.00000000042C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: wzkp8c4Z3F.exe, 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: wzkp8c4Z3F.exe, 0000000B.00000002.427695686.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: wzkp8c4Z3F.exe, 0000000B.00000002.427695686.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: dhcpmon.exe, 0000000C.00000002.431374912.0000000002C21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 0000000C.00000002.431374912.0000000002C21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.5a14629.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e8b7de.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.47245e0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.47245e0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.5a10000.20.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e90614.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.46efbc0.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.wzkp8c4Z3F.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e90614.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.5a10000.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.wzkp8c4Z3F.exe.3e94c3d.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.4489064.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.447cc37.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.wzkp8c4Z3F.exe.447780c.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.wzkp8c4Z3F.exe.46625a0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000000.318787004.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.431374912.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.427695686.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: wzkp8c4Z3F.exe PID: 5336, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: wzkp8c4Z3F.exe PID: 6004, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: wzkp8c4Z3F.exe PID: 3104, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6060, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Windows Management Instrumentation
    1
    Scheduled Task/Job
    112
    Process Injection
    2
    Masquerading
    11
    Input Capture
    211
    Security Software Discovery
    Remote Services11
    Input Capture
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts1
    Scheduled Task/Job
    Boot or Logon Initialization Scripts1
    Scheduled Task/Job
    1
    Disable or Modify Tools
    LSASS Memory2
    Process Discovery
    Remote Desktop Protocol11
    Archive Collected Data
    Exfiltration Over Bluetooth1
    Non-Standard Port
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
    Virtualization/Sandbox Evasion
    Security Account Manager21
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Remote Access Software
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
    Process Injection
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer1
    Non-Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA Secrets12
    System Information Discovery
    SSHKeyloggingData Transfer Size Limits11
    Application Layer Protocol
    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Hidden Files and Directories
    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items2
    Obfuscated Files or Information
    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
    Software Packing
    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
    Timestomp
    /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 708261 Sample: wzkp8c4Z3F.exe Startdate: 23/09/2022 Architecture: WINDOWS Score: 100 48 jasonbourne.bounceme.net 2->48 52 Snort IDS alert for network traffic 2->52 54 Multi AV Scanner detection for domain / URL 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 11 other signatures 2->58 9 wzkp8c4Z3F.exe 3 2->9         started        13 wzkp8c4Z3F.exe 2 2->13         started        15 dhcpmon.exe 2 2->15         started        17 dhcpmon.exe 3 2->17         started        signatures3 process4 file5 46 C:\Users\user\AppData\...\wzkp8c4Z3F.exe.log, ASCII 9->46 dropped 62 Uses schtasks.exe or at.exe to add and modify task schedules 9->62 64 Injects a PE file into a foreign processes 9->64 19 wzkp8c4Z3F.exe 1 16 9->19         started        24 wzkp8c4Z3F.exe 2 13->24         started        26 dhcpmon.exe 15->26         started        28 dhcpmon.exe 17->28         started        signatures6 process7 dnsIp8 50 jasonbourne.bounceme.net 79.110.62.187, 4032, 49700, 49701 LASOTELFR Germany 19->50 38 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->38 dropped 40 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 19->40 dropped 42 C:\Users\user\AppData\Local\...\tmpDBD9.tmp, XML 19->42 dropped 44 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 19->44 dropped 60 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->60 30 schtasks.exe 1 19->30         started        32 schtasks.exe 1 19->32         started        file9 signatures10 process11 process12 34 conhost.exe 30->34         started        36 conhost.exe 32->36         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    wzkp8c4Z3F.exe31%ReversingLabsByteCode-MSIL.Trojan.Pwsx
    wzkp8c4Z3F.exe38%VirustotalBrowse
    No Antivirus matches
    SourceDetectionScannerLabelLinkDownload
    1.2.wzkp8c4Z3F.exe.5a10000.20.unpack100%AviraTR/NanoCore.fadteDownload File
    1.0.wzkp8c4Z3F.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    SourceDetectionScannerLabelLink
    jasonbourne.bounceme.net20%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://www.jiyu-kobo.co.jp/jp/C0%URL Reputationsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/50%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/en-u0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://www.fontbureau.comgrita0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/50%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.fontbureau.comgrito0%URL Reputationsafe
    http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
    http://www.itcfonts.0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/Q0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/Q0%URL Reputationsafe
    http://www.ascendercorp.com/typedesigners.htmllkA0%Avira URL Cloudsafe
    http://www.founder.com.cn/cnTF0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/H0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://www.fontbureau.comd0%URL Reputationsafe
    http://www.fontbureau.come.com0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/z0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.fontbureau.comonyd50%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/m0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.fontbureau.comitu0%URL Reputationsafe
    http://www.fontbureau.comdsed0%URL Reputationsafe
    http://www.fontbureau.comals0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/Y0r10%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/Y0x0%Avira URL Cloudsafe
    jasonbourne.bounceme.net100%Avira URL Cloudmalware
    http://www.jiyu-kobo.co.jp/Y0r:0%Avira URL Cloudsafe
    jasonbourne.bounceme.net20%VirustotalBrowse
    http://www.fontbureau.como50%Avira URL Cloudsafe
    127.0.0.10%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/liqu0%Avira URL Cloudsafe
    http://www.fontbureau.comditam0%Avira URL Cloudsafe
    http://www.sakkal.com-e0$0%Avira URL Cloudsafe
    http://www.fontbureau.comkz0%Avira URL Cloudsafe
    http://www.fontbureau.comice0%Avira URL Cloudsafe
    http://www.agfamonotype.70%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    jasonbourne.bounceme.net
    79.110.62.187
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    jasonbourne.bounceme.nettrue
    • 20%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    127.0.0.1true
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.fontbureau.com/designers/cabarga.html.wzkp8c4Z3F.exe, 00000000.00000003.309247140.00000000061E3000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.fontbureau.com/designersGwzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.com/designers/?wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.jiyu-kobo.co.jp/jp/Cwzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306055723.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307217947.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307469242.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306992321.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307093650.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306922624.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308002992.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307299426.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307348154.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307721792.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307546287.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307963280.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307141741.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307022088.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306777523.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307761958.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306816461.00000000061E3000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.founder.com.cn/cn/bThewzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.ascendercorp.com/typedesigners.htmllkAwzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306739275.00000000061E3000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.com/designers?wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comonyd5wzkp8c4Z3F.exe, 00000000.00000003.308722684.00000000061E3000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.tiro.comwzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/Y0xwzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designerswzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.jiyu-kobo.co.jp/Y0r1wzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306055723.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307217947.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306992321.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307093650.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306922624.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307141741.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307022088.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306777523.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306816461.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305932536.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306739275.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305890213.00000000061DF000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307249023.00000000061E3000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.goodfont.co.krwzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/jp/5wzkp8c4Z3F.exe, 00000000.00000003.306055723.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305837903.00000000061E1000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://google.comwzkp8c4Z3F.exe, 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.jiyu-kobo.co.jp/Y0r:wzkp8c4Z3F.exe, 00000000.00000003.305932536.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305890213.00000000061DF000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305837903.00000000061E1000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.sajatypeworks.comwzkp8c4Z3F.exe, 00000000.00000003.301281997.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.typography.netDwzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn/cThewzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.galapagosdesign.com/staff/dennis.htmwzkp8c4Z3F.exe, 00000000.00000003.310369108.00000000061E0000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.310729246.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.310621004.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.310507059.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.310541533.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.310779336.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/en-uwzkp8c4Z3F.exe, 00000000.00000003.305837903.00000000061E1000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://fontfabrik.comwzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.comgritawzkp8c4Z3F.exe, 00000000.00000003.309271343.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309333675.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309247140.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309431649.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309126522.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309363707.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309401237.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309507837.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309478215.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309603550.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309176051.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308883091.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308800633.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308758634.00000000061E2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/5wzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307217947.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306992321.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307093650.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306922624.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307141741.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307022088.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306777523.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306816461.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305932536.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306739275.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305890213.00000000061DF000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307249023.00000000061E3000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/liquwzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307217947.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307469242.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306992321.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307093650.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306922624.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307299426.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307348154.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307721792.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307546287.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307141741.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307022088.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306777523.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307761958.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306816461.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307816382.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307667530.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306739275.00000000061E3000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.galapagosdesign.com/DPleasewzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.comgritowzkp8c4Z3F.exe, 00000000.00000003.320875715.00000000061C0000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.ascendercorp.com/typedesigners.htmlwzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306739275.00000000061E3000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.itcfonts.wzkp8c4Z3F.exe, 00000000.00000003.307742871.00000000061CF000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307785731.00000000061CF000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307699640.00000000061D2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/jp/Qwzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306922624.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306777523.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306816461.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306739275.00000000061E3000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fonts.comwzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.sandoll.co.krwzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.urwpp.deDPleasewzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.zhongyicts.com.cnwzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namewzkp8c4Z3F.exe, 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.sakkal.comwzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.como5wzkp8c4Z3F.exe, 00000000.00000003.320875715.00000000061C0000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.comditamwzkp8c4Z3F.exe, 00000000.00000003.308316786.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308440589.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308655841.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308472746.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308509585.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308685842.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308384890.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308722684.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308883091.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308414612.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308800633.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308547019.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308618210.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308758634.00000000061E2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.apache.org/licenses/LICENSE-2.0wzkp8c4Z3F.exe, 00000000.00000003.305091252.00000000061D3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comwzkp8c4Z3F.exe, 00000000.00000003.308440589.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308655841.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308472746.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308509585.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309431649.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308685842.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309363707.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309401237.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308384890.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309507837.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309478215.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309603550.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308722684.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308883091.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308414612.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308800633.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308547019.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308618210.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308758634.00000000061E2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.sakkal.com-e0$wzkp8c4Z3F.exe, 00000000.00000003.306621636.00000000061D3000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://www.jiyu-kobo.co.jp/Qwzkp8c4Z3F.exe, 00000000.00000003.306055723.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305932536.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305890213.00000000061DF000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305837903.00000000061E1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnTFwzkp8c4Z3F.exe, 00000000.00000003.304054048.00000000061C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-jones.htmlpwzkp8c4Z3F.exe, 00000000.00000003.308722684.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308758634.00000000061E2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comicewzkp8c4Z3F.exe, 00000000.00000003.320875715.00000000061C0000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/Hwzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306055723.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/jp/wzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306055723.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305932536.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.305890213.00000000061DF000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frerwzkp8c4Z3F.exe, 00000000.00000003.309325259.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309581492.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309384782.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309491636.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309448912.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309157104.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309226287.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309265537.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309355591.00000000061D5000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309106000.00000000061D4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309413300.00000000061D5000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.comdwzkp8c4Z3F.exe, 00000000.00000003.308758634.00000000061E2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.come.comwzkp8c4Z3F.exe, 00000000.00000003.308440589.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308655841.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308472746.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308509585.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308685842.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308722684.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308883091.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308414612.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308800633.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308547019.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308618210.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308758634.00000000061E2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/jp/zwzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306055723.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comlwzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNwzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.comkzwzkp8c4Z3F.exe, 00000000.00000003.308883091.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308800633.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308758634.00000000061E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.founder.com.cn/cnwzkp8c4Z3F.exe, 00000000.00000003.304054048.00000000061C2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-jones.htmlwzkp8c4Z3F.exe, 00000000.00000003.308781029.00000000061D4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308868619.00000000061D4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308741845.00000000061D4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308706862.00000000061D4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.jiyu-kobo.co.jp/Y0/wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/mwzkp8c4Z3F.exe, 00000000.00000003.306412625.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306127448.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306109408.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306992321.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307093650.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306922624.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306275167.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.307022088.00000000061E4000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306777523.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306816461.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306519677.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306347263.00000000061D8000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306644788.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.306739275.00000000061E3000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.agfamonotype.7wzkp8c4Z3F.exe, 00000000.00000003.320875715.00000000061C0000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.jiyu-kobo.co.jp/wzkp8c4Z3F.exe, 00000000.00000003.305837903.00000000061E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8wzkp8c4Z3F.exe, 00000000.00000002.344550086.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.comituwzkp8c4Z3F.exe, 00000000.00000003.309603550.00000000061E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comdsedwzkp8c4Z3F.exe, 00000000.00000003.308440589.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308655841.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308472746.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308509585.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308685842.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308384890.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308414612.00000000061E2000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308547019.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.308618210.00000000061E3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comalswzkp8c4Z3F.exe, 00000000.00000003.309478215.00000000061E3000.00000004.00000800.00020000.00000000.sdmp, wzkp8c4Z3F.exe, 00000000.00000003.309603550.00000000061E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  79.110.62.187
                                  jasonbourne.bounceme.netGermany
                                  39180LASOTELFRtrue
                                  Joe Sandbox Version:36.0.0 Rainbow Opal
                                  Analysis ID:708261
                                  Start date and time:2022-09-23 08:25:08 +02:00
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 10m 59s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:wzkp8c4Z3F.exe
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:21
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@18/12@12/1
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HDC Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                  • TCP Packets have been reduced to 100
                                  • Excluded IPs from analysis (whitelisted): 80.67.82.235, 80.67.82.211
                                  • Excluded domains from analysis (whitelisted): login.live.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, a1449.dscg2.akamai.net, arc.msn.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                  TimeTypeDescription
                                  08:26:10API Interceptor742x Sleep call for process: wzkp8c4Z3F.exe modified
                                  08:26:22AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  08:26:23Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\wzkp8c4Z3F.exe" s>$(Arg0)
                                  08:26:26Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                  08:26:33API Interceptor2x Sleep call for process: dhcpmon.exe modified
                                  No context
                                  No context
                                  No context
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):878592
                                  Entropy (8bit):6.916288172693511
                                  Encrypted:false
                                  SSDEEP:12288:w6DPRU35pZSzykCdUnbLFuR+EPlKz3Kf1GaIOoLm9QQK95s:4eOFdUnf0Jt8iMJVIJ
                                  MD5:C143CAC623FBF082ADEDD43CAD691A69
                                  SHA1:62BD3D43D6E897922CF557D4E40F7D6D9035A4BF
                                  SHA-256:3A542858DDB263F3B60A1C7340D508E7F392443E9EE8521D0C9E4A8289173FDF
                                  SHA-512:78A7BAE0DB2019CCD712DD0168BC5784D26F87929FECE225F36D4F729862183A3DF61BBD01160BBDBB9630C5D4EB49910F3402EA7489AD23144B8F1F270CD21D
                                  Malicious:true
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0......J.......:... ...@....@.. ....................................@..................................9..O....@..XF...........................9............................................... ............... ..H............text...$.... ...................... ..`.rsrc...XF...@...H..................@..@.reloc...............f..............@..B.................:......H............]...............9.............................................}.....(.......(.......}......(.......(.......(.....*&...}....*....0............{....o......{....o......{....o......{....o......{....o......(.......{....o......(.........._....9.............sy......{......o...............,\..{....o.......{..............o.....s........r...pr...po.......o......(....t.......(......+....+#.s........rA..prS..po.......o......*...0............{.....+..*..*..*..*..*..*..*..*..*
                                  Process:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Preview:[ZoneTransfer]....ZoneId=0
                                  Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1308
                                  Entropy (8bit):5.345811588615766
                                  Encrypted:false
                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                  MD5:2E016B886BDB8389D2DD0867BE55F87B
                                  SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                  SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                  SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                  Malicious:false
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                  Process:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1308
                                  Entropy (8bit):5.345811588615766
                                  Encrypted:false
                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                  MD5:2E016B886BDB8389D2DD0867BE55F87B
                                  SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                  SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                  SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                  Malicious:true
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                  Process:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1301
                                  Entropy (8bit):5.118479574222374
                                  Encrypted:false
                                  SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0PJIxtn:cbk4oL600QydbQxIYODOLedq3SJIj
                                  MD5:2761CF1D6E44C70E9DB2FC368E4CE76B
                                  SHA1:E915E0B02424B11641E2699F2CC3E4D33B031816
                                  SHA-256:CC924E89B08624128FC37FC127CA376584FE83E4B46C288792F1699F6C88FCF7
                                  SHA-512:904B9629B721A6D609919BCD5B9B726DC389E1717D61D124F692256C5124C90BBC837640B74E0B15E1778EEACCFA100713C89577D0A1AB8CED6AF9598C359B92
                                  Malicious:true
                                  Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                  Process:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1310
                                  Entropy (8bit):5.109425792877704
                                  Encrypted:false
                                  SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                  MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                  SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                  SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                  SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                  Malicious:false
                                  Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                  Process:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):232
                                  Entropy (8bit):7.024371743172393
                                  Encrypted:false
                                  SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                  MD5:32D0AAE13696FF7F8AF33B2D22451028
                                  SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                  SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                  SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                  Malicious:false
                                  Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                  Process:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  File Type:Non-ISO extended-ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):8
                                  Entropy (8bit):3.0
                                  Encrypted:false
                                  SSDEEP:3:84/t:pl
                                  MD5:E97A1DE2A5B2C4396A416629739F2BCC
                                  SHA1:ED27AEFE33F35859DF58340363D966F4CDD47B3A
                                  SHA-256:3AAAE8C9ED61B76929865B55FFD6B6F5265AE5463C60FC864B181078ED867A6B
                                  SHA-512:E5C1192FF94F89A1336494251209D1D7F82C110FBA050CD30930EF3A6F2E9C6D5211AA54BDD9A70738911AE1600EA0481B0D777C3FB32B6FD002F79D4FC7C2B9
                                  Malicious:true
                                  Preview:.I..w..H
                                  Process:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  File Type:data
                                  Category:modified
                                  Size (bytes):24
                                  Entropy (8bit):4.501629167387823
                                  Encrypted:false
                                  SSDEEP:3:9bzY6oRDIvYk:RzWDI3
                                  MD5:ACD3FB4310417DC77FE06F15B0E353E6
                                  SHA1:80E7002E655EB5765FDEB21114295CB96AD9D5EB
                                  SHA-256:DC3AE604991C9BB8FF8BC4502AE3D0DB8A3317512C0F432490B103B89C1A4368
                                  SHA-512:DA46A917DB6276CD4528CFE4AD113292D873CA2EBE53414730F442B83502E5FAF3D1AE87BFA295ADF01E3B44FDBCE239E21A318BFB2CCD1F4753846CB21F6F97
                                  Malicious:false
                                  Preview:9iH...}Z.4..f..J".C;"a
                                  Process:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):40
                                  Entropy (8bit):5.153055907333276
                                  Encrypted:false
                                  SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                  MD5:4E5E92E2369688041CC82EF9650EDED2
                                  SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                  SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                  SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                  Malicious:false
                                  Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                                  Process:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):327432
                                  Entropy (8bit):7.99938831605763
                                  Encrypted:true
                                  SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                  MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                  SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                  SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                  SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                  Malicious:false
                                  Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                  Process:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):38
                                  Entropy (8bit):4.458453829233061
                                  Encrypted:false
                                  SSDEEP:3:oNUWJRWSfO2Z2:oNNJASfhZ2
                                  MD5:C511FCE95999B1C831891818E4E7165C
                                  SHA1:3F7399E99E1C812CB4FFDBF9E45420F3B90EE17A
                                  SHA-256:ABCDCE28DCC9AF284B74CB00330C9CAC95B6573AD4496C5D6E2590FEED992F17
                                  SHA-512:7D3C61AFED5BEF54E7D5E4A04D757B82718E07CD0E5F6D5CE1969B8A22F0892436889797BDE25D5837BCD1A3BEACCA08985213EB533CFC87144188F457ABA5F9
                                  Malicious:false
                                  Preview:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):6.916288172693511
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Windows Screen Saver (13104/52) 0.07%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  File name:wzkp8c4Z3F.exe
                                  File size:878592
                                  MD5:c143cac623fbf082adedd43cad691a69
                                  SHA1:62bd3d43d6e897922cf557d4e40f7d6d9035a4bf
                                  SHA256:3a542858ddb263f3b60a1c7340d508e7f392443e9ee8521d0c9e4a8289173fdf
                                  SHA512:78a7bae0db2019ccd712dd0168bc5784d26f87929fece225f36d4f729862183a3df61bbd01160bbdbb9630c5d4eb49910f3402ea7489ad23144b8f1f270cd21d
                                  SSDEEP:12288:w6DPRU35pZSzykCdUnbLFuR+EPlKz3Kf1GaIOoLm9QQK95s:4eOFdUnf0Jt8iMJVIJ
                                  TLSH:D315D023DBDA5F47D01163B88490C2B557AAEF41A02EC2876FEA7C9FB0767919211F13
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0......J.......:... ...@....@.. ....................................@................................
                                  Icon Hash:ce9c9496e4949c9e
                                  Entrypoint:0x4d3a1e
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x9CFBFE9A [Tue Jun 17 08:06:50 2053 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xd39cc0x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x4658.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xda0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xd39b00x1c.text
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000xd1a240xd1c00False0.6975810581793802data6.928377089378491IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0xd40000x46580x4800False0.5441623263888888data6.175860568943547IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0xda0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountry
                                  RT_ICON0xd40e80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                                  RT_GROUP_ICON0xd83100x14data
                                  RT_VERSION0xd83240x334data
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  192.168.2.579.110.62.1874972340322816766 09/23/22-08:28:03.841045TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497234032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874970540322025019 09/23/22-08:27:08.890440TCP2025019ET TROJAN Possible NanoCore C2 60B497054032192.168.2.579.110.62.187
                                  79.110.62.187192.168.2.54032497062810290 09/23/22-08:27:17.892341TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 140324970679.110.62.187192.168.2.5
                                  79.110.62.187192.168.2.54032497012841753 09/23/22-08:26:43.565182TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)40324970179.110.62.187192.168.2.5
                                  192.168.2.579.110.62.1874970740322816766 09/23/22-08:27:27.538615TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497074032192.168.2.579.110.62.187
                                  79.110.62.187192.168.2.54032497042841753 09/23/22-08:26:57.404411TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)40324970479.110.62.187192.168.2.5
                                  192.168.2.579.110.62.1874970440322816766 09/23/22-08:26:53.398294TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497044032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874972440322025019 09/23/22-08:28:10.108277TCP2025019ET TROJAN Possible NanoCore C2 60B497244032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874970640322816718 09/23/22-08:27:18.571667TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497064032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874971740322816766 09/23/22-08:27:45.797275TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497174032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874972040322816766 09/23/22-08:27:53.992917TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497204032192.168.2.579.110.62.187
                                  79.110.62.187192.168.2.54032497242841753 09/23/22-08:28:35.213011TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)40324972479.110.62.187192.168.2.5
                                  192.168.2.579.110.62.1874970040322816766 09/23/22-08:26:32.618302TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497004032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874970140322025019 09/23/22-08:26:38.525077TCP2025019ET TROJAN Possible NanoCore C2 60B497014032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874970040322025019 09/23/22-08:26:30.256524TCP2025019ET TROJAN Possible NanoCore C2 60B497004032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874970540322816766 09/23/22-08:27:09.489809TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497054032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874970740322025019 09/23/22-08:27:25.994008TCP2025019ET TROJAN Possible NanoCore C2 60B497074032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874971740322025019 09/23/22-08:27:44.656647TCP2025019ET TROJAN Possible NanoCore C2 60B497174032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874972040322025019 09/23/22-08:27:52.410331TCP2025019ET TROJAN Possible NanoCore C2 60B497204032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874972340322025019 09/23/22-08:28:02.603420TCP2025019ET TROJAN Possible NanoCore C2 60B497234032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874970440322025019 09/23/22-08:26:52.369313TCP2025019ET TROJAN Possible NanoCore C2 60B497044032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874970140322816766 09/23/22-08:26:43.252402TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497014032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874970640322025019 09/23/22-08:27:16.819903TCP2025019ET TROJAN Possible NanoCore C2 60B497064032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874971640322025019 09/23/22-08:27:34.502399TCP2025019ET TROJAN Possible NanoCore C2 60B497164032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874971640322816766 09/23/22-08:27:36.333232TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497164032192.168.2.579.110.62.187
                                  192.168.2.579.110.62.1874970640322816766 09/23/22-08:27:18.571667TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497064032192.168.2.579.110.62.187
                                  TimestampSource PortDest PortSource IPDest IP
                                  Sep 23, 2022 08:26:29.966351032 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:29.994080067 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:29.994220972 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:30.256524086 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:30.338449001 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:30.338687897 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:30.416066885 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:30.416218996 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:30.445120096 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:30.588758945 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:30.959165096 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.040908098 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.078670025 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.078697920 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.078717947 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.078738928 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.078843117 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.078877926 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.106338024 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.106542110 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.106597900 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.106637955 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.106674910 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.106695890 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.106730938 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.106750965 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.106810093 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.106837034 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.106864929 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.106929064 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.134330034 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.134386063 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.134426117 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.134470940 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.134510994 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.134526014 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.134553909 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.134556055 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.134594917 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.134602070 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.134637117 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.134675026 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.134689093 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.134715080 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.134753942 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.134761095 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.134793043 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.134830952 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.134838104 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.134871006 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.134912014 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.134917021 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.134958982 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.135039091 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.162619114 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.162676096 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.162718058 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.162755966 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.162805080 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.162852049 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.162859917 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.162887096 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.162919998 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.162946939 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.162967920 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163007975 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163037062 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.163048029 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163089991 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163095951 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.163127899 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163167000 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163173914 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.163207054 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163244009 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163252115 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.163284063 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163322926 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163330078 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.163403988 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163444996 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163460970 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.163487911 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163525105 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163547039 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.163566113 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163604975 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163629055 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.163641930 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163683891 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163691998 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.163723946 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163765907 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163778067 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.163806915 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163846016 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163858891 CEST497004032192.168.2.579.110.62.187
                                  Sep 23, 2022 08:26:31.163887024 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163925886 CEST40324970079.110.62.187192.168.2.5
                                  Sep 23, 2022 08:26:31.163943052 CEST497004032192.168.2.579.110.62.187
                                  TimestampSource PortDest PortSource IPDest IP
                                  Sep 23, 2022 08:26:29.927006006 CEST5928753192.168.2.58.8.8.8
                                  Sep 23, 2022 08:26:29.947521925 CEST53592878.8.8.8192.168.2.5
                                  Sep 23, 2022 08:26:38.259186983 CEST5864853192.168.2.58.8.8.8
                                  Sep 23, 2022 08:26:38.279278994 CEST53586488.8.8.8192.168.2.5
                                  Sep 23, 2022 08:26:51.948220015 CEST6084153192.168.2.58.8.8.8
                                  Sep 23, 2022 08:26:51.971592903 CEST53608418.8.8.8192.168.2.5
                                  Sep 23, 2022 08:27:07.921751976 CEST6189353192.168.2.58.8.8.8
                                  Sep 23, 2022 08:27:07.947571993 CEST53618938.8.8.8192.168.2.5
                                  Sep 23, 2022 08:27:16.514156103 CEST6064953192.168.2.58.8.8.8
                                  Sep 23, 2022 08:27:16.535902977 CEST53606498.8.8.8192.168.2.5
                                  Sep 23, 2022 08:27:25.903851032 CEST5144153192.168.2.58.8.8.8
                                  Sep 23, 2022 08:27:25.923316956 CEST53514418.8.8.8192.168.2.5
                                  Sep 23, 2022 08:27:33.744175911 CEST6097553192.168.2.58.8.8.8
                                  Sep 23, 2022 08:27:33.763693094 CEST53609758.8.8.8192.168.2.5
                                  Sep 23, 2022 08:27:43.511075974 CEST5922053192.168.2.58.8.8.8
                                  Sep 23, 2022 08:27:44.569376945 CEST5922053192.168.2.58.8.8.8
                                  Sep 23, 2022 08:27:44.588841915 CEST53592208.8.8.8192.168.2.5
                                  Sep 23, 2022 08:27:52.360873938 CEST5668253192.168.2.58.8.8.8
                                  Sep 23, 2022 08:27:52.381127119 CEST53566828.8.8.8192.168.2.5
                                  Sep 23, 2022 08:28:00.559617996 CEST6265953192.168.2.58.8.8.8
                                  Sep 23, 2022 08:28:00.579726934 CEST53626598.8.8.8192.168.2.5
                                  Sep 23, 2022 08:28:10.054294109 CEST5858153192.168.2.58.8.8.8
                                  Sep 23, 2022 08:28:10.076261044 CEST53585818.8.8.8192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Sep 23, 2022 08:26:29.927006006 CEST192.168.2.58.8.8.80xb97dStandard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:26:38.259186983 CEST192.168.2.58.8.8.80xa085Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:26:51.948220015 CEST192.168.2.58.8.8.80xe8f2Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:27:07.921751976 CEST192.168.2.58.8.8.80xa48cStandard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:27:16.514156103 CEST192.168.2.58.8.8.80xd369Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:27:25.903851032 CEST192.168.2.58.8.8.80xfea4Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:27:33.744175911 CEST192.168.2.58.8.8.80x29e5Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:27:43.511075974 CEST192.168.2.58.8.8.80xa7a6Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:27:44.569376945 CEST192.168.2.58.8.8.80xa7a6Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:27:52.360873938 CEST192.168.2.58.8.8.80xaa44Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:28:00.559617996 CEST192.168.2.58.8.8.80xd61Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:28:10.054294109 CEST192.168.2.58.8.8.80xa8ceStandard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Sep 23, 2022 08:26:29.947521925 CEST8.8.8.8192.168.2.50xb97dNo error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:26:38.279278994 CEST8.8.8.8192.168.2.50xa085No error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:26:51.971592903 CEST8.8.8.8192.168.2.50xe8f2No error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:27:07.947571993 CEST8.8.8.8192.168.2.50xa48cNo error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:27:16.535902977 CEST8.8.8.8192.168.2.50xd369No error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:27:25.923316956 CEST8.8.8.8192.168.2.50xfea4No error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:27:33.763693094 CEST8.8.8.8192.168.2.50x29e5No error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:27:44.588841915 CEST8.8.8.8192.168.2.50xa7a6No error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:27:52.381127119 CEST8.8.8.8192.168.2.50xaa44No error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:28:00.579726934 CEST8.8.8.8192.168.2.50xd61No error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                  Sep 23, 2022 08:28:10.076261044 CEST8.8.8.8192.168.2.50xa8ceNo error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false

                                  Click to jump to process

                                  Target ID:0
                                  Start time:08:26:02
                                  Start date:23/09/2022
                                  Path:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\wzkp8c4Z3F.exe"
                                  Imagebase:0xe10000
                                  File size:878592 bytes
                                  MD5 hash:C143CAC623FBF082ADEDD43CAD691A69
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.323700911.00000000033BF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.340095078.00000000045CD000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  Reputation:low

                                  Target ID:1
                                  Start time:08:26:11
                                  Start date:23/09/2022
                                  Path:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  Imagebase:0xe10000
                                  File size:878592 bytes
                                  MD5 hash:C143CAC623FBF082ADEDD43CAD691A69
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.586234147.0000000005A10000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000000.318787004.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000000.318787004.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000001.00000000.318787004.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000000.318787004.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.587604607.0000000005C80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.587604607.0000000005C80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.587604607.0000000005C80000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.587604607.0000000005C80000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.597276168.0000000007A70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.597276168.0000000007A70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.597276168.0000000007A70000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.597276168.0000000007A70000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.595560442.00000000075E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.595560442.00000000075E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.595560442.00000000075E0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.595560442.00000000075E0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.596333698.0000000007780000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.596333698.0000000007780000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.596333698.0000000007780000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.596333698.0000000007780000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.595841255.0000000007600000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.579892381.0000000004477000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.582097897.00000000045AD000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.578423356.000000000438F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.596002221.0000000007620000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.595922296.0000000007610000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.596141792.0000000007630000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000003.358154679.000000000172E000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.596606327.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.596606327.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.596606327.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.596606327.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.577659680.00000000042C1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.581112990.000000000451D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.596732046.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.596732046.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.596732046.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.596732046.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.586144489.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.586144489.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.586144489.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.586144489.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.568786578.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.587474125.0000000005C70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.587474125.0000000005C70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.587474125.0000000005C70000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.587474125.0000000005C70000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.595445386.0000000007330000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                  Reputation:low

                                  Target ID:2
                                  Start time:08:26:19
                                  Start date:23/09/2022
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDBD9.tmp
                                  Imagebase:0x20000
                                  File size:185856 bytes
                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:3
                                  Start time:08:26:22
                                  Start date:23/09/2022
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7fcd70000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:5
                                  Start time:08:26:24
                                  Start date:23/09/2022
                                  Path:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\wzkp8c4Z3F.exe 0
                                  Imagebase:0xac0000
                                  File size:878592 bytes
                                  MD5 hash:C143CAC623FBF082ADEDD43CAD691A69
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Reputation:low

                                  Target ID:6
                                  Start time:08:26:25
                                  Start date:23/09/2022
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpF6C5.tmp
                                  Imagebase:0x20000
                                  File size:185856 bytes
                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:7
                                  Start time:08:26:26
                                  Start date:23/09/2022
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7fcd70000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:8
                                  Start time:08:26:27
                                  Start date:23/09/2022
                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                  Imagebase:0xfa0000
                                  File size:878592 bytes
                                  MD5 hash:C143CAC623FBF082ADEDD43CAD691A69
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000008.00000002.398660819.000000000344F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low

                                  Target ID:9
                                  Start time:08:26:30
                                  Start date:23/09/2022
                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                  Imagebase:0xec0000
                                  File size:878592 bytes
                                  MD5 hash:C143CAC623FBF082ADEDD43CAD691A69
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:.Net C# or VB.NET
                                  Reputation:low

                                  Target ID:11
                                  Start time:08:26:35
                                  Start date:23/09/2022
                                  Path:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\wzkp8c4Z3F.exe
                                  Imagebase:0xa20000
                                  File size:878592 bytes
                                  MD5 hash:C143CAC623FBF082ADEDD43CAD691A69
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.431461213.0000000003E49000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.427695686.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.427695686.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.427695686.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  Reputation:low

                                  Target ID:12
                                  Start time:08:26:43
                                  Start date:23/09/2022
                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  Imagebase:0x870000
                                  File size:878592 bytes
                                  MD5 hash:C143CAC623FBF082ADEDD43CAD691A69
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.431374912.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.431374912.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000C.00000002.431374912.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  Reputation:low

                                  Target ID:13
                                  Start time:08:26:50
                                  Start date:23/09/2022
                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  Imagebase:0x840000
                                  File size:878592 bytes
                                  MD5 hash:C143CAC623FBF082ADEDD43CAD691A69
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:.Net C# or VB.NET
                                  Reputation:low

                                  No disassembly