Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2P4OWESFNE.exe

Overview

General Information

Sample Name:2P4OWESFNE.exe
Analysis ID:708889
MD5:69956e7cc66b2e6b4a15dc779d63b459
SHA1:63e96a654fd677da56b73d14fc588a3581e8d57e
SHA256:38403140be153292b9fa08bcd87dae41e0f9e26327aaac95a05fea54decc291b
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 2P4OWESFNE.exe (PID: 612 cmdline: "C:\Users\user\Desktop\2P4OWESFNE.exe" MD5: 69956E7CC66B2E6B4A15DC779D63B459)
    • 2P4OWESFNE.exe (PID: 6076 cmdline: C:\Users\user\Desktop\2P4OWESFNE.exe MD5: 69956E7CC66B2E6B4A15DC779D63B459)
    • 2P4OWESFNE.exe (PID: 4148 cmdline: C:\Users\user\Desktop\2P4OWESFNE.exe MD5: 69956E7CC66B2E6B4A15DC779D63B459)
      • schtasks.exe (PID: 812 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpD28D.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 2108 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpDA9C.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • 2P4OWESFNE.exe (PID: 6132 cmdline: C:\Users\user\Desktop\2P4OWESFNE.exe 0 MD5: 69956E7CC66B2E6B4A15DC779D63B459)
    • 2P4OWESFNE.exe (PID: 612 cmdline: C:\Users\user\Desktop\2P4OWESFNE.exe MD5: 69956E7CC66B2E6B4A15DC779D63B459)
  • dhcpmon.exe (PID: 2328 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: 69956E7CC66B2E6B4A15DC779D63B459)
    • dhcpmon.exe (PID: 4300 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 69956E7CC66B2E6B4A15DC779D63B459)
  • dhcpmon.exe (PID: 3788 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 69956E7CC66B2E6B4A15DC779D63B459)
    • dhcpmon.exe (PID: 4648 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 69956E7CC66B2E6B4A15DC779D63B459)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "9c6d4c8a-884b-4287-8ce0-7edf4a23", "Group": "X File", "Domain1": "jasonbourne.bounceme.net", "Domain2": "127.0.0.1", "Port": 4032, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.545805454.0000000002D81000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000B.00000002.545805454.0000000002D81000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x2c939:$a1: NanoCore.ClientPluginHost
    • 0x2c8fc:$a2: NanoCore.ClientPlugin
    • 0x2ccd0:$b1: get_BuilderSettings
    • 0x2c987:$b4: IClientAppHost
    • 0x2cd41:$b6: AddHostEntry
    • 0x2cdb0:$b7: LogClientException
    • 0x2cd25:$b8: PipeExists
    • 0x2c974:$b9: IClientLoggingHost
    0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfcf5:$a: NanoCore
      • 0xfd05:$a: NanoCore
      • 0xff39:$a: NanoCore
      • 0xff4d:$a: NanoCore
      • 0xff8d:$a: NanoCore
      • 0xfd54:$b: ClientPlugin
      • 0xff56:$b: ClientPlugin
      • 0xff96:$b: ClientPlugin
      • 0xfe7b:$c: ProjectData
      • 0x10882:$d: DESCrypto
      • 0x1824e:$e: KeepAlive
      • 0x1623c:$g: LogClientMessage
      • 0x12437:$i: get_Connected
      • 0x10bb8:$j: #=q
      • 0x10be8:$j: #=q
      • 0x10c04:$j: #=q
      • 0x10c34:$j: #=q
      • 0x10c50:$j: #=q
      • 0x10c6c:$j: #=q
      • 0x10c9c:$j: #=q
      • 0x10cb8:$j: #=q
      Click to see the 109 entries
      SourceRuleDescriptionAuthorStrings
      11.2.2P4OWESFNE.exe.6ec0000.23.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x8ba5:$x1: NanoCore.ClientPluginHost
      • 0x8bd2:$x2: IClientNetworkHost
      11.2.2P4OWESFNE.exe.6ec0000.23.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0x8ba5:$x2: NanoCore.ClientPluginHost
      • 0x9b74:$s2: FileCommand
      • 0xe576:$s4: PipeCreated
      • 0x8bbf:$s5: IClientLoggingHost
      11.2.2P4OWESFNE.exe.6ec0000.23.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0x8b7f:$x2: NanoCore.ClientPlugin
      • 0x8ba5:$x3: NanoCore.ClientPluginHost
      • 0x8b70:$i3: IClientNetwork
      • 0x8b95:$i5: IClientDataHost
      • 0x8bbf:$i6: IClientLoggingHost
      • 0x8bd2:$i7: IClientNetworkHost
      • 0x8be5:$i9: IClientNameObjectCollection
      • 0x8902:$s1: ClientPlugin
      • 0x8b88:$s1: ClientPlugin
      11.2.2P4OWESFNE.exe.6ec0000.23.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0x8ba5:$a1: NanoCore.ClientPluginHost
      • 0x8b7f:$a2: NanoCore.ClientPlugin
      • 0x8bbf:$b9: IClientLoggingHost
      11.2.2P4OWESFNE.exe.72f0000.27.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x13a8:$x1: NanoCore.ClientPluginHost
      Click to see the 290 entries

      AV Detection

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\2P4OWESFNE.exe, ProcessId: 4148, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\2P4OWESFNE.exe, ProcessId: 4148, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Persistence and Installation Behavior

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpD28D.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpD28D.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\2P4OWESFNE.exe, ParentImage: C:\Users\user\Desktop\2P4OWESFNE.exe, ParentProcessId: 4148, ParentProcessName: 2P4OWESFNE.exe, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpD28D.tmp, ProcessId: 812, ProcessName: schtasks.exe

      Stealing of Sensitive Information

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\2P4OWESFNE.exe, ProcessId: 4148, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\2P4OWESFNE.exe, ProcessId: 4148, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Timestamp:192.168.2.379.110.62.1874970840322816766 09/24/22-10:06:53.636236
      SID:2816766
      Source Port:49708
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970340322025019 09/24/22-10:06:04.969403
      SID:2025019
      Source Port:49703
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970040322025019 09/24/22-10:05:35.183673
      SID:2025019
      Source Port:49700
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970740322025019 09/24/22-10:06:45.272787
      SID:2025019
      Source Port:49707
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970440322816718 09/24/22-10:06:19.996354
      SID:2816718
      Source Port:49704
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:79.110.62.187192.168.2.34032497042810290 09/24/22-10:06:20.563916
      SID:2810290
      Source Port:4032
      Destination Port:49704
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970940322816766 09/24/22-10:06:59.700744
      SID:2816766
      Source Port:49709
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970240322816766 09/24/22-10:05:50.043192
      SID:2816766
      Source Port:49702
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970240322025019 09/24/22-10:05:48.835604
      SID:2025019
      Source Port:49702
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970540322816766 09/24/22-10:06:30.444040
      SID:2816766
      Source Port:49705
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970640322025019 09/24/22-10:06:38.454304
      SID:2025019
      Source Port:49706
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970340322816766 09/24/22-10:06:11.169922
      SID:2816766
      Source Port:49703
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970540322025019 09/24/22-10:06:29.331655
      SID:2025019
      Source Port:49705
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:79.110.62.187192.168.2.34032497002841753 09/24/22-10:05:39.949299
      SID:2841753
      Source Port:4032
      Destination Port:49700
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874971140322025019 09/24/22-10:07:30.021020
      SID:2025019
      Source Port:49711
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970640322816766 09/24/22-10:06:39.820524
      SID:2816766
      Source Port:49706
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874971040322816766 09/24/22-10:07:06.791276
      SID:2816766
      Source Port:49710
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970940322025019 09/24/22-10:06:58.980960
      SID:2025019
      Source Port:49709
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970440322025019 09/24/22-10:06:16.738677
      SID:2025019
      Source Port:49704
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970440322816766 09/24/22-10:06:19.996354
      SID:2816766
      Source Port:49704
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970040322816766 09/24/22-10:05:41.035836
      SID:2816766
      Source Port:49700
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874971040322025019 09/24/22-10:07:05.908978
      SID:2025019
      Source Port:49710
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:79.110.62.187192.168.2.34032497032841753 09/24/22-10:06:09.982472
      SID:2841753
      Source Port:4032
      Destination Port:49703
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970740322816766 09/24/22-10:06:46.278312
      SID:2816766
      Source Port:49707
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.379.110.62.1874970840322025019 09/24/22-10:06:51.652364
      SID:2025019
      Source Port:49708
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:79.110.62.187192.168.2.34032497112841753 09/24/22-10:07:35.065229
      SID:2841753
      Source Port:4032
      Destination Port:49711
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:79.110.62.187192.168.2.34032497102841753 09/24/22-10:07:20.944242
      SID:2841753
      Source Port:4032
      Destination Port:49710
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 2P4OWESFNE.exeReversingLabs: Detection: 30%
      Source: 2P4OWESFNE.exeVirustotal: Detection: 38%Perma Link
      Source: jasonbourne.bounceme.netAvira URL Cloud: Label: malware
      Source: jasonbourne.bounceme.netVirustotal: Detection: 21%Perma Link
      Source: jasonbourne.bounceme.netVirustotal: Detection: 21%Perma Link
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 30%
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.399db60.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d2b7de.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.35b5a00.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4846ef0.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.6394629.19.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d30614.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49ac0b9.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49a7a90.16.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.399db60.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.3951740.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4740faa.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.6390000.20.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d34c3d.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4846ef0.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.484b519.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.0.2P4OWESFNE.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.48420ba.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.6390000.20.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4720749.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d30614.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49a7a90.16.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49a2c5a.17.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.472c97d.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.3555928.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.35b5a00.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000B.00000002.545805454.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000014.00000002.454333239.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.323536613.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 2P4OWESFNE.exe PID: 4148, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4300, type: MEMORYSTR
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 11.2.2P4OWESFNE.exe.6390000.20.unpackAvira: Label: TR/NanoCore.fadte
      Source: 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "9c6d4c8a-884b-4287-8ce0-7edf4a23", "Group": "X File", "Domain1": "jasonbourne.bounceme.net", "Domain2": "127.0.0.1", "Port": 4032, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
      Source: 2P4OWESFNE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 2P4OWESFNE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.582073536.00000000072E0000.00000004.08000000.00040000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\System.pdbPR source: 2P4OWESFNE.exe, 0000000B.00000003.420388555.000000000692F000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: 2P4OWESFNE.exe, 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmp
      Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\System.pdb'$ source: 2P4OWESFNE.exe, 0000000B.00000003.420388555.000000000692F000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: System.pdb source: 2P4OWESFNE.exe, 0000000B.00000003.420147243.000000000699A000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000003.417993421.000000000699A000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp

      Networking

      barindex
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49700 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49700 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 79.110.62.187:4032 -> 192.168.2.3:49700
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49702 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49702 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49703 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49703 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 79.110.62.187:4032 -> 192.168.2.3:49703
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49704 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49704 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.3:49704 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 79.110.62.187:4032 -> 192.168.2.3:49704
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49705 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49705 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49706 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49706 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49707 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49707 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49708 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49708 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49709 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49709 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49710 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49710 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 79.110.62.187:4032 -> 192.168.2.3:49710
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49711 -> 79.110.62.187:4032
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 79.110.62.187:4032 -> 192.168.2.3:49711
      Source: Malware configuration extractorURLs: jasonbourne.bounceme.net
      Source: Malware configuration extractorURLs: 127.0.0.1
      Source: Joe Sandbox ViewASN Name: LASOTELFR LASOTELFR
      Source: global trafficTCP traffic: 192.168.2.3:49700 -> 79.110.62.187:4032
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://google.com
      Source: 2P4OWESFNE.exe, 00000000.00000002.316838120.0000000002511000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.545805454.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000F.00000002.396880865.0000000003281000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000011.00000002.405949937.0000000003021000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000012.00000002.436640584.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: 2P4OWESFNE.exe, 00000000.00000003.276965761.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.277157816.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276860526.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276563437.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276587282.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276770607.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276649732.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276409952.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276610677.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276454457.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276690868.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.277253089.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276430334.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276470377.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276493423.000000000587E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
      Source: 2P4OWESFNE.exe, 00000000.00000003.276563437.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276587282.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276454457.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276430334.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276470377.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276493423.000000000587E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comb
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: 2P4OWESFNE.exe, 00000000.00000003.277157816.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.277253089.000000000587F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comlt
      Source: 2P4OWESFNE.exe, 00000000.00000003.276965761.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276860526.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276563437.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276587282.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276770607.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276649732.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276610677.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276470377.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276493423.000000000587E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.
      Source: 2P4OWESFNE.exe, 00000000.00000002.315982825.0000000000AD8000.00000004.00000020.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: 2P4OWESFNE.exe, 00000000.00000003.281609306.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281684901.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281306484.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281498740.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281466035.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281525771.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281277497.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281568026.0000000005883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: 2P4OWESFNE.exe, 00000000.00000003.281277497.0000000005883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlu
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: 2P4OWESFNE.exe, 00000000.00000003.280044708.000000000585E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.313553405.0000000005850000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerst
      Source: 2P4OWESFNE.exe, 00000000.00000002.315982825.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comK
      Source: 2P4OWESFNE.exe, 00000000.00000002.315982825.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comueto
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.273551028.0000000005885000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.273501204.0000000005885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
      Source: 2P4OWESFNE.exe, 00000000.00000003.273424033.0000000005885000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.273551028.0000000005885000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.273501204.0000000005885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comW
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: 2P4OWESFNE.exe, 00000000.00000003.275854585.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.275871672.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.275890999.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.275649189.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.275833969.000000000587E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/X
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: 2P4OWESFNE.exe, 00000000.00000003.282453873.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.282058555.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.282015592.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.282145563.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281979992.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.282387327.0000000005883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
      Source: 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: 2P4OWESFNE.exe, 00000000.00000003.276322256.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276384161.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: 2P4OWESFNE.exe, 00000000.00000003.276322256.000000000587F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnP
      Source: 2P4OWESFNE.exe, 00000000.00000003.276384161.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276409952.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276454457.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276430334.000000000587F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.
      Source: unknownDNS traffic detected: queries for: jasonbourne.bounceme.net
      Source: 2P4OWESFNE.exe, 00000000.00000002.315154979.00000000008CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.399db60.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d2b7de.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.35b5a00.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4846ef0.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.6394629.19.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d30614.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49ac0b9.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49a7a90.16.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.399db60.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.3951740.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4740faa.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.6390000.20.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d34c3d.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4846ef0.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.484b519.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.0.2P4OWESFNE.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.48420ba.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.6390000.20.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4720749.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d30614.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49a7a90.16.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49a2c5a.17.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.472c97d.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.3555928.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.35b5a00.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000B.00000002.545805454.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000014.00000002.454333239.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.323536613.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 2P4OWESFNE.exe PID: 4148, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4300, type: MEMORYSTR

      System Summary

      barindex
      Source: 11.2.2P4OWESFNE.exe.6ec0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.6ec0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.6ec0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.72f0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.72f0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.72f0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7190000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7190000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7190000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.2P4OWESFNE.exe.399db60.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.2P4OWESFNE.exe.399db60.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.2P4OWESFNE.exe.399db60.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.2P4OWESFNE.exe.399db60.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.735e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.735e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.735e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 19.2.2P4OWESFNE.exe.3d2b7de.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 19.2.2P4OWESFNE.exe.3d2b7de.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 19.2.2P4OWESFNE.exe.3d2b7de.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 19.2.2P4OWESFNE.exe.3d2b7de.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 19.2.2P4OWESFNE.exe.2d4956c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 19.2.2P4OWESFNE.exe.2d4956c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 19.2.2P4OWESFNE.exe.2d4956c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7350000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7350000.33.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7350000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7354c9f.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7354c9f.34.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7354c9f.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.6394629.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.6394629.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.6394629.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7390000.35.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7390000.35.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7390000.35.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.72e0000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.72e0000.26.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.72e0000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.6760000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.6760000.22.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.6760000.22.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 19.2.2P4OWESFNE.exe.3d30614.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 19.2.2P4OWESFNE.exe.3d30614.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 19.2.2P4OWESFNE.exe.3d30614.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.49ac0b9.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.49ac0b9.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.2P4OWESFNE.exe.49ac0b9.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.2dacac4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.2dacac4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.2dacac4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7310000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7310000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7310000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.6760000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.6760000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.6760000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.2e078dc.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.2e078dc.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.2e078dc.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.2e13b24.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.2e13b24.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.2e13b24.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.2P4OWESFNE.exe.2e13b24.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.492abc6.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.492abc6.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.492abc6.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.472c97d.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.472c97d.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.472c97d.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.49a7a90.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.49a7a90.16.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.49a7a90.16.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.491c796.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.491c796.13.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.491c796.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.2P4OWESFNE.exe.399db60.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.2P4OWESFNE.exe.399db60.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.2P4OWESFNE.exe.399db60.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.2P4OWESFNE.exe.399db60.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.2P4OWESFNE.exe.3951740.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.2P4OWESFNE.exe.3951740.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.2P4OWESFNE.exe.3951740.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.2P4OWESFNE.exe.3951740.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7340000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7340000.31.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7340000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7300000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7300000.28.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7300000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7300000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7300000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7300000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.4913967.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.4913967.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.4913967.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7310000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7310000.29.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7310000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 20.2.dhcpmon.exe.29e9684.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 20.2.dhcpmon.exe.29e9684.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 20.2.dhcpmon.exe.29e9684.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.491c796.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.491c796.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.491c796.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.6ec0000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.6ec0000.23.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.6ec0000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.4740faa.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.4740faa.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.4740faa.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.2P4OWESFNE.exe.4740faa.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.6390000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.6390000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.6390000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 19.2.2P4OWESFNE.exe.3d34c3d.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 19.2.2P4OWESFNE.exe.3d34c3d.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 19.2.2P4OWESFNE.exe.3d34c3d.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.2e13b24.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.2e13b24.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.2e13b24.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.484b519.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.484b519.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.484b519.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.2P4OWESFNE.exe.484b519.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7320000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7320000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7320000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7390000.35.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7390000.35.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7390000.35.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.2e078dc.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.2e078dc.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.2e078dc.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.2P4OWESFNE.exe.2e078dc.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.62f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.62f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.62f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.48420ba.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.48420ba.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.48420ba.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.2P4OWESFNE.exe.48420ba.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7180000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7180000.24.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7180000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.6390000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.6390000.20.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.6390000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7320000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7320000.30.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7320000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.4720749.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.4720749.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.2P4OWESFNE.exe.4720749.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7340000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7340000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7340000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 19.2.2P4OWESFNE.exe.3d30614.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 19.2.2P4OWESFNE.exe.3d30614.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 19.2.2P4OWESFNE.exe.3d30614.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.4913967.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.4913967.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.4913967.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.2P4OWESFNE.exe.4913967.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.49a7a90.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.49a7a90.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.2P4OWESFNE.exe.49a7a90.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.492abc6.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.492abc6.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.492abc6.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.72e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.72e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.72e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7180000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7180000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7180000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.4720749.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.4720749.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.4720749.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.7350000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.7350000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.7350000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.49a2c5a.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.49a2c5a.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.2P4OWESFNE.exe.49a2c5a.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.472c97d.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.472c97d.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.2P4OWESFNE.exe.472c97d.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.2P4OWESFNE.exe.2e28160.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.2P4OWESFNE.exe.2e28160.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.2P4OWESFNE.exe.2e28160.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.2P4OWESFNE.exe.2e28160.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.2P4OWESFNE.exe.3555928.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.2P4OWESFNE.exe.3555928.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
      Source: 0.2.2P4OWESFNE.exe.3555928.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.2P4OWESFNE.exe.3555928.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.2P4OWESFNE.exe.3555928.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.545805454.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.582899602.0000000007350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.582899602.0000000007350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000B.00000002.582899602.0000000007350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.582528929.0000000007320000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.582528929.0000000007320000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000B.00000002.582528929.0000000007320000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.583497422.0000000007390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.583497422.0000000007390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000B.00000002.583497422.0000000007390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.577143081.00000000062F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.577143081.00000000062F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000B.00000002.577143081.00000000062F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.582073536.00000000072E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.582073536.00000000072E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000B.00000002.582073536.00000000072E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000014.00000002.454333239.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000014.00000002.454333239.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.582795269.0000000007340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.582795269.0000000007340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000B.00000002.582795269.0000000007340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000000.00000002.323536613.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.323536613.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.323536613.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.578555669.0000000006760000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.578555669.0000000006760000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000B.00000002.578555669.0000000006760000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000003.348304401.00000000068C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.581164411.0000000006EC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.581164411.0000000006EC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000B.00000002.581164411.0000000006EC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 4148, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 4148, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 4148, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: dhcpmon.exe PID: 4300, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: dhcpmon.exe PID: 4300, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 2P4OWESFNE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 11.2.2P4OWESFNE.exe.6ec0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.6ec0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.6ec0000.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.6ec0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.72f0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.72f0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.72f0000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.72f0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7190000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7190000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7190000.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7190000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.2P4OWESFNE.exe.399db60.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.2P4OWESFNE.exe.399db60.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.2P4OWESFNE.exe.399db60.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.2P4OWESFNE.exe.399db60.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.2P4OWESFNE.exe.399db60.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.735e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.735e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.735e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.735e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 19.2.2P4OWESFNE.exe.3d2b7de.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 19.2.2P4OWESFNE.exe.3d2b7de.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 19.2.2P4OWESFNE.exe.3d2b7de.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 19.2.2P4OWESFNE.exe.3d2b7de.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 19.2.2P4OWESFNE.exe.3d2b7de.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 19.2.2P4OWESFNE.exe.2d4956c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 19.2.2P4OWESFNE.exe.2d4956c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 19.2.2P4OWESFNE.exe.2d4956c.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 19.2.2P4OWESFNE.exe.2d4956c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7350000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7350000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7350000.33.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7350000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7354c9f.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7354c9f.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7354c9f.34.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7354c9f.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.6394629.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.6394629.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.6394629.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.6394629.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7390000.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7390000.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7390000.35.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7390000.35.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.72e0000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.72e0000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.72e0000.26.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.72e0000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.6760000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.6760000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.6760000.22.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.6760000.22.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 19.2.2P4OWESFNE.exe.3d30614.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 19.2.2P4OWESFNE.exe.3d30614.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 19.2.2P4OWESFNE.exe.3d30614.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 19.2.2P4OWESFNE.exe.3d30614.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.49ac0b9.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.49ac0b9.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.2P4OWESFNE.exe.49ac0b9.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.2dacac4.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.2dacac4.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.2dacac4.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.2dacac4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7310000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7310000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7310000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7310000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.6760000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.6760000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.6760000.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.6760000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.2e078dc.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.2e078dc.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.2e078dc.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.2e078dc.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.2e13b24.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.2e13b24.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.2e13b24.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.2P4OWESFNE.exe.2e13b24.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.492abc6.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.492abc6.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.492abc6.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.492abc6.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.472c97d.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.472c97d.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.472c97d.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.472c97d.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.49a7a90.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.49a7a90.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.49a7a90.16.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.49a7a90.16.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.491c796.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.491c796.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.491c796.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.491c796.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.2P4OWESFNE.exe.399db60.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.2P4OWESFNE.exe.399db60.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.2P4OWESFNE.exe.399db60.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.2P4OWESFNE.exe.399db60.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.2P4OWESFNE.exe.399db60.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.2P4OWESFNE.exe.3951740.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.2P4OWESFNE.exe.3951740.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.2P4OWESFNE.exe.3951740.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.2P4OWESFNE.exe.3951740.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7340000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7340000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7340000.31.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7340000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7300000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7300000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7300000.28.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7300000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7300000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7300000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7300000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7300000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.4913967.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.4913967.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.4913967.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.4913967.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7310000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7310000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7310000.29.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7310000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 20.2.dhcpmon.exe.29e9684.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 20.2.dhcpmon.exe.29e9684.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 20.2.dhcpmon.exe.29e9684.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 20.2.dhcpmon.exe.29e9684.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.491c796.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.491c796.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.491c796.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.491c796.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.6ec0000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.6ec0000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.6ec0000.23.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.6ec0000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.4740faa.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.4740faa.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.4740faa.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.2P4OWESFNE.exe.4740faa.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.6390000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.6390000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.6390000.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.6390000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 19.2.2P4OWESFNE.exe.3d34c3d.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 19.2.2P4OWESFNE.exe.3d34c3d.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 19.2.2P4OWESFNE.exe.3d34c3d.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 19.2.2P4OWESFNE.exe.3d34c3d.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.2P4OWESFNE.exe.4846ef0.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.2e13b24.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.2e13b24.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.2e13b24.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.2e13b24.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.484b519.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.484b519.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.484b519.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.484b519.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.2P4OWESFNE.exe.484b519.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7320000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7320000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7320000.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7320000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7390000.35.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7390000.35.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7390000.35.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7390000.35.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.2e078dc.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.2e078dc.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.2e078dc.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.2P4OWESFNE.exe.2e078dc.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.62f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.62f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.62f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.62f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.48420ba.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.48420ba.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.48420ba.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.48420ba.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.2P4OWESFNE.exe.48420ba.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7180000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7180000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7180000.24.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7180000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.6390000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.6390000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.6390000.20.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.6390000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7320000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7320000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7320000.30.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7320000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.4720749.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.4720749.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.2P4OWESFNE.exe.4720749.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7340000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7340000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7340000.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7340000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 19.2.2P4OWESFNE.exe.3d30614.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 19.2.2P4OWESFNE.exe.3d30614.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 19.2.2P4OWESFNE.exe.3d30614.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 19.2.2P4OWESFNE.exe.3d30614.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.4913967.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.4913967.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.4913967.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.4913967.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.2P4OWESFNE.exe.4913967.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.49a7a90.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.49a7a90.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.2P4OWESFNE.exe.49a7a90.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.492abc6.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.492abc6.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.492abc6.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.492abc6.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.72e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.72e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.72e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.72e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7180000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7180000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7180000.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7180000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.4720749.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.4720749.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.4720749.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.4720749.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.7350000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7350000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.7350000.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.7350000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.49a2c5a.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.49a2c5a.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.2P4OWESFNE.exe.49a2c5a.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.472c97d.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.472c97d.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.2P4OWESFNE.exe.472c97d.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.2P4OWESFNE.exe.2e28160.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 11.2.2P4OWESFNE.exe.2e28160.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.2P4OWESFNE.exe.2e28160.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.2P4OWESFNE.exe.2e28160.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.2P4OWESFNE.exe.3555928.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.2P4OWESFNE.exe.3555928.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
      Source: 0.2.2P4OWESFNE.exe.3555928.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.2P4OWESFNE.exe.3555928.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.2P4OWESFNE.exe.3555928.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.2P4OWESFNE.exe.35b5a00.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.545805454.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.582899602.0000000007350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.582899602.0000000007350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.582899602.0000000007350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000B.00000002.582899602.0000000007350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.582528929.0000000007320000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.582528929.0000000007320000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.582528929.0000000007320000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000B.00000002.582528929.0000000007320000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.583497422.0000000007390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.583497422.0000000007390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.583497422.0000000007390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000B.00000002.583497422.0000000007390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.577143081.00000000062F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.577143081.00000000062F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.577143081.00000000062F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000B.00000002.577143081.00000000062F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.582073536.00000000072E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.582073536.00000000072E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.582073536.00000000072E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000B.00000002.582073536.00000000072E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000014.00000002.454333239.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000014.00000002.454333239.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.582795269.0000000007340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.582795269.0000000007340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.582795269.0000000007340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000B.00000002.582795269.0000000007340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000000.00000002.323536613.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.323536613.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.323536613.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.578555669.0000000006760000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.578555669.0000000006760000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.578555669.0000000006760000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000B.00000002.578555669.0000000006760000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000003.348304401.00000000068C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.581164411.0000000006EC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.581164411.0000000006EC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000B.00000002.581164411.0000000006EC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000B.00000002.581164411.0000000006EC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 4148, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 4148, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 4148, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: dhcpmon.exe PID: 4300, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: dhcpmon.exe PID: 4300, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeCode function: 0_2_008ACD38
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeCode function: 11_2_06770040
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeCode function: 11_2_067602B0
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeCode function: 11_2_02C4E480
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeCode function: 11_2_02C4E471
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeCode function: 11_2_02C4BBD4
      Source: 2P4OWESFNE.exe, 00000000.00000002.325822284.0000000006AB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTargetParameterCount.dll> vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 00000000.00000002.327355499.0000000007201000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 00000000.00000002.317558813.00000000025D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 00000000.00000002.327724909.00000000074A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 00000000.00000002.315154979.00000000008CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 00000000.00000002.316838120.0000000002511000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 00000000.00000002.317687477.00000000025F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exeBinary or memory string: OriginalFilename vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.545805454.0000000002D81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562343969.0000000003E01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.577730180.00000000063B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582899602.0000000007350000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582899602.0000000007350000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582528929.0000000007320000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.577143081.00000000062F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582073536.00000000072E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.578555669.0000000006760000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.583638040.000000000739E000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000003.348304401.00000000068C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.583284971.0000000007378000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582870992.0000000007348000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.581164411.0000000006EC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000F.00000002.401272695.0000000003348000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000F.00000002.401736695.0000000003360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000F.00000002.401086106.0000000003344000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000F.00000002.417128868.0000000004671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000F.00000002.396880865.0000000003281000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000F.00000002.416584941.0000000004493000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 0000000F.00000002.391427131.000000000145A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exe, 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exeBinary or memory string: OriginalFilenameAPNt.exeD vs 2P4OWESFNE.exe
      Source: 2P4OWESFNE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: dhcpmon.exe.11.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: 2P4OWESFNE.exeReversingLabs: Detection: 30%
      Source: 2P4OWESFNE.exeVirustotal: Detection: 38%
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeFile read: C:\Users\user\Desktop\2P4OWESFNE.exe:Zone.IdentifierJump to behavior
      Source: 2P4OWESFNE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Users\user\Desktop\2P4OWESFNE.exe "C:\Users\user\Desktop\2P4OWESFNE.exe"
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess created: C:\Users\user\Desktop\2P4OWESFNE.exe C:\Users\user\Desktop\2P4OWESFNE.exe
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess created: C:\Users\user\Desktop\2P4OWESFNE.exe C:\Users\user\Desktop\2P4OWESFNE.exe
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpD28D.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpDA9C.tmp
      Source: unknownProcess created: C:\Users\user\Desktop\2P4OWESFNE.exe C:\Users\user\Desktop\2P4OWESFNE.exe 0
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess created: C:\Users\user\Desktop\2P4OWESFNE.exe C:\Users\user\Desktop\2P4OWESFNE.exe
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess created: C:\Users\user\Desktop\2P4OWESFNE.exe C:\Users\user\Desktop\2P4OWESFNE.exe
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpD28D.tmp
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpDA9C.tmp
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess created: C:\Users\user\Desktop\2P4OWESFNE.exe C:\Users\user\Desktop\2P4OWESFNE.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2P4OWESFNE.exe.logJump to behavior
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD28D.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@19/12@11/1
      Source: 2P4OWESFNE.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:848:120:WilError_01
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{9c6d4c8a-884b-4287-8ce0-7edf4a237b07}
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net data provider for sqlserver
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5680:120:WilError_01
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: 2P4OWESFNE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: 2P4OWESFNE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: 2P4OWESFNE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.582073536.00000000072E0000.00000004.08000000.00040000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\System.pdbPR source: 2P4OWESFNE.exe, 0000000B.00000003.420388555.000000000692F000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: 2P4OWESFNE.exe, 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmp
      Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\System.pdb'$ source: 2P4OWESFNE.exe, 0000000B.00000003.420388555.000000000692F000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: System.pdb source: 2P4OWESFNE.exe, 0000000B.00000003.420147243.000000000699A000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000003.417993421.000000000699A000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: 2P4OWESFNE.exe, GUI/DangNhap.cs.Net Code: ResourceTemplateDefine System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.0.2P4OWESFNE.exe.20000.0.unpack, GUI/DangNhap.cs.Net Code: ResourceTemplateDefine System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: dhcpmon.exe.11.dr, GUI/DangNhap.cs.Net Code: ResourceTemplateDefine System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 2P4OWESFNE.exeStatic PE information: 0xDF67EFF8 [Sat Oct 9 03:26:48 2088 UTC]
      Source: initial sampleStatic PE information: section name: .text entropy: 7.049986344828056
      Source: initial sampleStatic PE information: section name: .text entropy: 7.049986344828056
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 11.0.2P4OWESFNE.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpD28D.tmp

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeFile opened: C:\Users\user\Desktop\2P4OWESFNE.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: Yara matchFile source: 00000011.00000002.407355851.0000000003078000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.317159998.0000000002568000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000F.00000002.398922786.00000000032D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 2P4OWESFNE.exe PID: 6132, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2328, type: MEMORYSTR
      Source: 2P4OWESFNE.exe, 00000000.00000002.317159998.0000000002568000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000F.00000002.398922786.00000000032D8000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000011.00000002.407355851.0000000003078000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000012.00000002.438596087.0000000002DFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
      Source: 2P4OWESFNE.exe, 00000000.00000002.317159998.0000000002568000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000F.00000002.398922786.00000000032D8000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000011.00000002.407355851.0000000003078000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000012.00000002.438596087.0000000002DFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAMEDSOFTWARE\VMWARE, INC.\VMWARE TOOLS
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -5534023222112862s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -240000s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -239878s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -239751s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -239638s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -239516s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -239403s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -239282s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -239142s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -239000s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -238874s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -238746s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -238595s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -238438s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -238298s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -238169s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -238046s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -237906s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -237792s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -237669s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -237549s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -237433s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -237284s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -237125s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -237001s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -236888s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -236763s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -236641s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -236515s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -236391s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -236250s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -236134s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -236001s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -235845s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -235722s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -235595s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -235438s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -235311s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -235184s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -235048s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -234922s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -234812s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -234703s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -234591s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -234465s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -234288s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -234156s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -234048s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -233931s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -233802s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -233681s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 2136Thread sleep time: -233545s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 4496Thread sleep time: -12912720851596678s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -4611686018427385s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -240000s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -239688s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -239500s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -239360s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -239188s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -239000s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -238844s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -238641s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -238500s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -238344s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -238184s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -238031s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -237748s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -237344s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -237188s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -236938s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -236500s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -235438s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -233750s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -233283s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -233141s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -232997s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -232857s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -232721s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -232547s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -232413s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -232291s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -232178s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -232047s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -231891s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -231750s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -231622s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -231497s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -231363s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -231234s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -231105s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -230984s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -230844s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -230702s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -230590s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -230391s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -230250s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -230000s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -229750s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -229500s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -229359s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -229188s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -229047s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 3560Thread sleep time: -41226s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -228913s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -228727s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -228587s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -228453s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -228250s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -228041s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -227842s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -227641s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -227344s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -227000s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -226839s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -226547s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -226297s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -226000s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -225844s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -225670s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -225540s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -225371s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 5176Thread sleep time: -225236s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -2767011611056431s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -240000s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -239839s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 968Thread sleep count: 9344 > 30
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -239696s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -239570s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -239452s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -239312s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -239109s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -238809s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -238609s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -238479s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -238358s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -238156s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -237984s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -237872s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -237750s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -237500s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -237312s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -237184s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -237058s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -236646s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -236453s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -236203s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -236062s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -235859s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -235743s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -235562s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -235389s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -235228s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -235109s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -234999s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -234812s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -234656s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -234500s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -234359s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -234203s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -233953s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -233808s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -233685s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -233500s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -233340s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -233164s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -233040s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -232920s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -232750s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -232609s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -232406s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -232281s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -232156s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -232046s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -231932s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -231805s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -231683s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5336Thread sleep time: -41226s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -231562s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -231406s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -231278s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -231171s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -231000s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -230656s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -230531s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -230359s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -230092s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -229964s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -229703s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -229312s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -228950s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -228601s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -228453s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -228343s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -228216s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5940Thread sleep time: -228000s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -3689348814741908s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -240000s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1244Thread sleep count: 9459 > 30
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -239623s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -239497s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -239387s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -239250s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -239096s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -238891s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -238744s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -238344s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -238188s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -238070s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -237938s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -237781s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -237651s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -237546s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -237391s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -237238s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -237088s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -236938s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -236781s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -236670s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -236543s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -236297s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -236138s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -235996s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -235750s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -235589s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -235391s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -235141s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -235000s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -234865s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -234714s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -234594s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -234391s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -234238s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -234077s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -233937s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -233750s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -233594s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -233468s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -233280s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -233094s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -232938s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -232797s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -232652s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -232500s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -232297s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -232141s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -231891s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -231688s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -231503s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -231332s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -231141s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -230988s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2764Thread sleep time: -41226s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -230856s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -230690s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -230547s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -230344s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -230218s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -230047s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -228188s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -227938s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -226000s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -225797s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -225641s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -225500s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -225297s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -225047s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -224844s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -224547s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -224250s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -224047s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3044Thread sleep time: -223797s >= -30000s
      Source: C:\Users\user\Desktop\2P4OWESFNE.exe TID: 3924Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2064Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4424Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 240000
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239878
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239751
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239638
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239516
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239403
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239282
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239142
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239000
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238874
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238746
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238595
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238438
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238298
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238169
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238046
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237906
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237792
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237669
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237549
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237433
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237284
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237125
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237001
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236888
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236763
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236641
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236515
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236391
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236250
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236134
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236001
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235845
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235722
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235595
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235438
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235311
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235184
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235048
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234922
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234812
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234703
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234591
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234465
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234288
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234156
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234048
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 233931
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 233802
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 233681
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 233545
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 240000
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239688
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239500
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239360
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239188
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239000
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238844
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238641
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238500
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238344
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238184
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238031
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237748
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237344
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237188
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236938
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236500
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235438
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 233750
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 233283
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 233141
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232997
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232857
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232721
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232547
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232413
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232291
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232178
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232047
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 231891
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 231750
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 231622
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 231497
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 231363
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 231234
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 231105
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 230984
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 230844
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 230702
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 230590
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 230391
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 230250
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 230000
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 229750
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 229500
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 229359
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 229188
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 229047
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 228913
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 228727
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 228587
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 228453
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 228250
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 228041
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 227842
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 227641
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 227344
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 227000
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 226839
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 226547
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 226297
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 226000
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 225844
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 225670
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 225540
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 225371
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 225236
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 240000
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239839
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239696
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239570
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239452
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239312
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239109
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238809
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238609
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238479
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238358
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238156
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237984
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237872
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237750
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237500
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237312
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237184
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237058
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236646
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236453
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236203
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236062
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235859
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235743
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235562
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235389
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235228
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235109
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234999
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234812
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234656
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234500
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234359
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234203
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233953
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233808
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233685
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233500
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233340
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233164
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233040
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232920
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232750
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232609
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232406
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232281
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232156
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232046
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231932
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231805
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231683
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231562
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231406
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231278
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231171
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231000
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230656
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230531
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230359
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230092
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229964
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229703
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229312
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228950
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228601
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228453
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228343
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228216
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228000
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 240000
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239623
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239497
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239387
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239250
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239096
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238891
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238744
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238344
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238188
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238070
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237938
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237781
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237651
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237546
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237391
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237238
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237088
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236938
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236781
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236670
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236543
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236297
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236138
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235996
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235750
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235589
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235391
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235141
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235000
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234865
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234714
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234594
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234391
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234238
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234077
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233937
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233750
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233594
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233468
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233280
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233094
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232938
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232797
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232652
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232500
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232297
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232141
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231891
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231688
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231503
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231332
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231141
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230988
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230856
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230690
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230547
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230344
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230218
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230047
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228188
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227938
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 226000
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 225797
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 225641
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 225500
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 225297
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 225047
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 224844
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 224547
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 224250
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 224047
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 223797
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWindow / User API: threadDelayed 9219
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWindow / User API: threadDelayed 9145
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWindow / User API: threadDelayed 9220
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeWindow / User API: threadDelayed 9344
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeWindow / User API: threadDelayed 9459
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 240000
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239878
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239751
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239638
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239516
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239403
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239282
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239142
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239000
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238874
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238746
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238595
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238438
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238298
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238169
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238046
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237906
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237792
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237669
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237549
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237433
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237284
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237125
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237001
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236888
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236763
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236641
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236515
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236391
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236250
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236134
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236001
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235845
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235722
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235595
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235438
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235311
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235184
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235048
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234922
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234812
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234703
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234591
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234465
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234288
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234156
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 234048
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 233931
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 233802
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 233681
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 233545
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 240000
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239688
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239500
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239360
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239188
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 239000
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238844
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238641
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238500
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238344
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238184
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 238031
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237748
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237344
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 237188
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236938
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 236500
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 235438
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 233750
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 233283
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 233141
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232997
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232857
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232721
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232547
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232413
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232291
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232178
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 232047
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 231891
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 231750
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 231622
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 231497
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 231363
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 231234
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 231105
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 230984
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 230844
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 230702
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 230590
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 230391
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 230250
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 230000
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 229750
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 229500
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 229359
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 229188
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 229047
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 41226
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 228913
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 228727
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 228587
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 228453
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 228250
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 228041
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 227842
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 227641
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 227344
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 227000
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 226839
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 226547
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 226297
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 226000
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 225844
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 225670
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 225540
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 225371
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 225236
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 240000
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239839
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239696
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239570
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239452
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239312
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239109
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238809
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238609
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238479
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238358
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238156
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237984
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237872
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237750
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237500
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237312
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237184
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237058
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236646
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236453
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236203
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236062
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235859
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235743
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235562
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235389
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235228
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235109
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234999
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234812
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234656
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234500
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234359
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234203
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233953
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233808
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233685
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233500
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233340
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233164
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233040
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232920
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232750
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232609
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232406
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232281
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232156
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232046
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231932
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231805
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231683
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41226
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231562
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231406
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231278
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231171
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231000
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230656
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230531
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230359
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230092
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229964
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229703
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229312
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228950
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228601
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228453
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228343
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228216
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228000
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 240000
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239623
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239497
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239387
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239250
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239096
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238891
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238744
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238344
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238188
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238070
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237938
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237781
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237651
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237546
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237391
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237238
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237088
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236938
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236781
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236670
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236543
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236297
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236138
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235996
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235750
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235589
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235391
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235141
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235000
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234865
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234714
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234594
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234391
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234238
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234077
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233937
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233750
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233594
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233468
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233280
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233094
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232938
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232797
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232652
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232500
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232297
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232141
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231891
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231688
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231503
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231332
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231141
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230988
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41226
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230856
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230690
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230547
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230344
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230218
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230047
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228188
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227938
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 226000
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 225797
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 225641
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 225500
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 225297
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 225047
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 224844
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 224547
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 224250
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 224047
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 223797
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: dhcpmon.exe, 00000012.00000002.438596087.0000000002DFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: kernel32.dll.wine_get_unix_file_nameDSOFTWARE\VMware, Inc.\VMware Tools
      Source: dhcpmon.exe, 00000012.00000002.438596087.0000000002DFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
      Source: dhcpmon.exe, 00000012.00000002.438596087.0000000002DFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\TSOFTWARE\Oracle\VirtualBox Guest AdditionsNSYSTEM\ControlSet001\Services\Disk\Enum
      Source: dhcpmon.exe, 00000012.00000002.438596087.0000000002DFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SystemBiosVersion
      Source: 2P4OWESFNE.exe, 00000000.00000002.317159998.0000000002568000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000F.00000002.398922786.00000000032D8000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000011.00000002.407355851.0000000003078000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000012.00000002.438596087.0000000002DFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: QEMU6HARDWARE\Description\System VideoBiosVersion
      Source: dhcpmon.exe, 00000012.00000002.438596087.0000000002DFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeMemory written: C:\Users\user\Desktop\2P4OWESFNE.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeMemory written: C:\Users\user\Desktop\2P4OWESFNE.exe base: 400000 value starts with: 4D5A
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess created: C:\Users\user\Desktop\2P4OWESFNE.exe C:\Users\user\Desktop\2P4OWESFNE.exe
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess created: C:\Users\user\Desktop\2P4OWESFNE.exe C:\Users\user\Desktop\2P4OWESFNE.exe
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpD28D.tmp
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpDA9C.tmp
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeProcess created: C:\Users\user\Desktop\2P4OWESFNE.exe C:\Users\user\Desktop\2P4OWESFNE.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: 2P4OWESFNE.exe, 0000000B.00000002.556704223.000000000309E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.558898275.00000000031DE000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.577845341.00000000064FC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: 2P4OWESFNE.exe, 0000000B.00000002.584346129.000000000794B000.00000004.00000010.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.585723049.00000000087AE000.00000004.00000010.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.584265454.000000000784C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager 4L
      Source: 2P4OWESFNE.exe, 0000000B.00000002.585668342.00000000086AB000.00000004.00000010.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.584584723.0000000007C6B000.00000004.00000010.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.578436193.000000000673C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
      Source: 2P4OWESFNE.exe, 0000000B.00000002.584684449.0000000007DAC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager 8
      Source: 2P4OWESFNE.exe, 0000000B.00000002.578884962.00000000068BE000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program ManagerS
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582022992.00000000072DC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Users\user\Desktop\2P4OWESFNE.exe VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Users\user\Desktop\2P4OWESFNE.exe VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Users\user\Desktop\2P4OWESFNE.exe VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Users\user\Desktop\2P4OWESFNE.exe VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\2P4OWESFNE.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.399db60.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d2b7de.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.35b5a00.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4846ef0.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.6394629.19.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d30614.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49ac0b9.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49a7a90.16.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.399db60.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.3951740.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4740faa.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.6390000.20.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d34c3d.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4846ef0.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.484b519.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.0.2P4OWESFNE.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.48420ba.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.6390000.20.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4720749.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d30614.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49a7a90.16.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49a2c5a.17.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.472c97d.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.3555928.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.35b5a00.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000B.00000002.545805454.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000014.00000002.454333239.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.323536613.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 2P4OWESFNE.exe PID: 4148, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4300, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: 2P4OWESFNE.exe, 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 00000000.00000002.323536613.0000000003951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exeString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.545805454.0000000002D81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.545805454.0000000002D81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: 2P4OWESFNE.exe, 0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
      Source: 2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582899602.0000000007350000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582528929.0000000007320000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.583497422.0000000007390000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
      Source: 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
      Source: 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.577143081.00000000062F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.577143081.00000000062F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
      Source: 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582073536.00000000072E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582795269.0000000007340000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.578555669.0000000006760000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
      Source: 2P4OWESFNE.exe, 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
      Source: 2P4OWESFNE.exe, 0000000B.00000003.348304401.00000000068C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 0000000B.00000002.581164411.0000000006EC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: 2P4OWESFNE.exe, 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 2P4OWESFNE.exe, 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: dhcpmon.exe, 00000014.00000002.454333239.0000000002981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dhcpmon.exe, 00000014.00000002.454333239.0000000002981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.399db60.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d2b7de.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.35b5a00.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4846ef0.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.6394629.19.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d30614.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49ac0b9.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49a7a90.16.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.399db60.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.3951740.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4740faa.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.6390000.20.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d34c3d.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4846ef0.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.484b519.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.0.2P4OWESFNE.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.48420ba.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.6390000.20.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.4720749.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.2P4OWESFNE.exe.3d30614.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49a7a90.16.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.49a2c5a.17.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.2P4OWESFNE.exe.472c97d.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.3555928.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.2P4OWESFNE.exe.35b5a00.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000B.00000002.545805454.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000014.00000002.454333239.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.323536613.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 2P4OWESFNE.exe PID: 4148, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 2P4OWESFNE.exe PID: 612, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4300, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Windows Management Instrumentation
      1
      Scheduled Task/Job
      112
      Process Injection
      2
      Masquerading
      21
      Input Capture
      211
      Security Software Discovery
      Remote Services21
      Input Capture
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default Accounts1
      Scheduled Task/Job
      Boot or Logon Initialization Scripts1
      Scheduled Task/Job
      1
      Disable or Modify Tools
      LSASS Memory2
      Process Discovery
      Remote Desktop Protocol11
      Archive Collected Data
      Exfiltration Over Bluetooth1
      Non-Standard Port
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
      Virtualization/Sandbox Evasion
      Security Account Manager21
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
      Remote Access Software
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer1
      Non-Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
      Deobfuscate/Decode Files or Information
      LSA Secrets12
      System Information Discovery
      SSHKeyloggingData Transfer Size Limits11
      Application Layer Protocol
      Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common1
      Hidden Files and Directories
      Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
      Obfuscated Files or Information
      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
      Software Packing
      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
      Timestomp
      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 708889 Sample: 2P4OWESFNE.exe Startdate: 24/09/2022 Architecture: WINDOWS Score: 100 50 jasonbourne.bounceme.net 2->50 54 Snort IDS alert for network traffic 2->54 56 Multi AV Scanner detection for domain / URL 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 11 other signatures 2->60 9 2P4OWESFNE.exe 3 2->9         started        13 2P4OWESFNE.exe 2 2->13         started        15 dhcpmon.exe 2 2->15         started        17 dhcpmon.exe 3 2->17         started        signatures3 process4 file5 48 C:\Users\user\AppData\...\2P4OWESFNE.exe.log, ASCII 9->48 dropped 64 Uses schtasks.exe or at.exe to add and modify task schedules 9->64 66 Injects a PE file into a foreign processes 9->66 19 2P4OWESFNE.exe 1 16 9->19         started        24 2P4OWESFNE.exe 9->24         started        26 2P4OWESFNE.exe 13->26         started        28 dhcpmon.exe 15->28         started        30 dhcpmon.exe 17->30         started        signatures6 process7 dnsIp8 52 jasonbourne.bounceme.net 79.110.62.187, 4032, 49700, 49702 LASOTELFR Germany 19->52 40 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->40 dropped 42 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 19->42 dropped 44 C:\Users\user\AppData\Local\...\tmpD28D.tmp, XML 19->44 dropped 46 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 19->46 dropped 62 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->62 32 schtasks.exe 1 19->32         started        34 schtasks.exe 1 19->34         started        file9 signatures10 process11 process12 36 conhost.exe 32->36         started        38 conhost.exe 34->38         started       

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      2P4OWESFNE.exe30%ReversingLabsWin32.Trojan.Pwsx
      2P4OWESFNE.exe38%VirustotalBrowse
      No Antivirus matches
      SourceDetectionScannerLabelLinkDownload
      0.2.2P4OWESFNE.exe.3555928.8.unpack100%AviraHEUR/AGEN.1244307Download File
      11.0.2P4OWESFNE.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      11.2.2P4OWESFNE.exe.6390000.20.unpack100%AviraTR/NanoCore.fadteDownload File
      SourceDetectionScannerLabelLink
      jasonbourne.bounceme.net22%VirustotalBrowse
      SourceDetectionScannerLabelLink
      http://www.carterandcone.comb0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.carterandcone.comlt0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.carterandcone.com0%URL Reputationsafe
      http://www.fontbureau.comueto0%URL Reputationsafe
      http://www.fonts.comW0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      jasonbourne.bounceme.net22%VirustotalBrowse
      http://www.fontbureau.comK0%Avira URL Cloudsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      jasonbourne.bounceme.net100%Avira URL Cloudmalware
      http://www.monotype.0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cno.0%URL Reputationsafe
      http://www.zhongyicts.com.cno.0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.carterandcone.como.0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.founder.com.cn/cn/X0%Avira URL Cloudsafe
      http://www.zhongyicts.com.cnP0%Avira URL Cloudsafe
      127.0.0.10%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      jasonbourne.bounceme.net
      79.110.62.187
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      jasonbourne.bounceme.nettrue
      • 22%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      127.0.0.1true
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.carterandcone.comb2P4OWESFNE.exe, 00000000.00000003.276563437.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276587282.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276454457.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276430334.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276470377.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276493423.000000000587E000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.apache.org/licenses/LICENSE-2.02P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.com2P4OWESFNE.exe, 00000000.00000002.315982825.0000000000AD8000.00000004.00000020.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.fontbureau.com/designersG2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comK2P4OWESFNE.exe, 00000000.00000002.315982825.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designers/?2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.founder.com.cn/cn/bThe2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers/cabarga.htmlu2P4OWESFNE.exe, 00000000.00000003.281277497.0000000005883000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designers?2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.carterandcone.comlt2P4OWESFNE.exe, 00000000.00000003.277157816.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.277253089.000000000587F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.tiro.com2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.goodfont.co.kr2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://google.com2P4OWESFNE.exe, 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.carterandcone.com2P4OWESFNE.exe, 00000000.00000003.276965761.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.277157816.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276860526.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276563437.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276587282.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276770607.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276649732.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276409952.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276610677.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276454457.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276690868.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.277253089.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276430334.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276470377.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276493423.000000000587E000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comueto2P4OWESFNE.exe, 00000000.00000002.315982825.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.comW2P4OWESFNE.exe, 00000000.00000003.273424033.0000000005885000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.273551028.0000000005885000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.273501204.0000000005885000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.coml2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.com2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netD2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlN2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/cThe2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htm2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.com2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-jones.html2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/X2P4OWESFNE.exe, 00000000.00000003.275854585.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.275871672.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.275890999.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.275649189.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.275833969.000000000587E000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.html2P4OWESFNE.exe, 00000000.00000003.281609306.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281684901.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281306484.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281498740.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281466035.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281525771.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281277497.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281568026.0000000005883000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.monotype.2P4OWESFNE.exe, 00000000.00000003.282453873.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.282058555.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.282015592.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.282145563.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.281979992.0000000005883000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.282387327.0000000005883000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPlease2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cno.2P4OWESFNE.exe, 00000000.00000003.276384161.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276409952.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276454457.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276430334.000000000587F000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers82P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.zhongyicts.com.cnP2P4OWESFNE.exe, 00000000.00000003.276322256.000000000587F000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fonts.com2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.273551028.0000000005885000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.273501204.0000000005885000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sandoll.co.kr2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deDPlease2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cn2P4OWESFNE.exe, 00000000.00000003.276322256.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276384161.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name2P4OWESFNE.exe, 00000000.00000002.316838120.0000000002511000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000B.00000002.545805454.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 0000000F.00000002.396880865.0000000003281000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000011.00000002.405949937.0000000003021000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000012.00000002.436640584.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.carterandcone.como.2P4OWESFNE.exe, 00000000.00000003.276965761.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276860526.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276563437.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276587282.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276770607.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276649732.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276610677.000000000587E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276470377.000000000587F000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.276493423.000000000587E000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sakkal.com2P4OWESFNE.exe, 00000000.00000002.325916784.0000000006AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designerst2P4OWESFNE.exe, 00000000.00000003.280044708.000000000585E000.00000004.00000800.00020000.00000000.sdmp, 2P4OWESFNE.exe, 00000000.00000003.313553405.0000000005850000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    79.110.62.187
                                    jasonbourne.bounceme.netGermany
                                    39180LASOTELFRtrue
                                    Joe Sandbox Version:36.0.0 Rainbow Opal
                                    Analysis ID:708889
                                    Start date and time:2022-09-24 10:03:59 +02:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 12m 32s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:2P4OWESFNE.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:24
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@19/12@11/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HDC Information:Failed
                                    HCA Information:
                                    • Successful, ratio: 99%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                    • TCP Packets have been reduced to 100
                                    • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ctldl.windowsupdate.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                    TimeTypeDescription
                                    10:05:04API Interceptor928x Sleep call for process: 2P4OWESFNE.exe modified
                                    10:05:30Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\2P4OWESFNE.exe" s>$(Arg0)
                                    10:05:31AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    10:05:33Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                    10:05:41API Interceptor222x Sleep call for process: dhcpmon.exe modified
                                    No context
                                    No context
                                    No context
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):1000448
                                    Entropy (8bit):7.037105846383947
                                    Encrypted:false
                                    SSDEEP:12288:0QhLuyAHRzxXSG2tmkgHAkC7trKPGCoY3qyfnkgl9TnmVuLkQDsGE1qF:lhLuyy6LtC+7ZKoifnHTn01GEc
                                    MD5:69956E7CC66B2E6B4A15DC779D63B459
                                    SHA1:63E96A654FD677DA56B73D14FC588A3581E8D57E
                                    SHA-256:38403140BE153292B9FA08BCD87DAE41E0F9E26327AAAC95A05FEA54DECC291B
                                    SHA-512:FFA9729470E7CFDE290CE3A406637D0B1E35A9D3AF912F826C879FF4021FB4AC2DE0A2ADB183B881836CA3E073AE196E8B50F9BE91FF10091E0D2700B4B1DC77
                                    Malicious:true
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....g...............0......J........... ... ....@.. ....................................@.................................@...O.... ...F..........................$................................................ ............... ..H............text........ ...................... ..`.rsrc....F... ...H..................@..@.reloc...............B..............@..B................t.......H.......$....X......6.....................................................s}...}......}.....(.......(.....*..0...........s......o......(.....*...0............{....o....r...p(....,..{....o....r...p(....,..{....o....r...p(....+....9......{....o.....{....o....(......,W..{.....{....o.....{....o....o|.....,#.r...p(....&s......o......(......+.r)..p(....&.+.rK..p(....&.r...p(....&*....0..+.........,..{.......+....,...{....o........(.....*..0............s....}.....s....}.....s....}..
                                    Process:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Preview:[ZoneTransfer]....ZoneId=0
                                    Process:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1394
                                    Entropy (8bit):5.340883346054895
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4bE4KnKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84F0:MIHK5HKXE1qHbHKnYHKhQnoPtHoxHhAR
                                    MD5:B51A52A837298BCF7A6EB58551AEF99C
                                    SHA1:61EEFCC20AC255B8651769E5C48E27B2A983FC4A
                                    SHA-256:1D393FBB3CE754EA699462C2778587A7F2451EB23BE2BD5084C95A46B20BE8AF
                                    SHA-512:138544399787651C847837719606197E539857206CCB271E0F4A86E2017FBADABADF5A235B6F6F1DA8ADE7EF29DBA3115CD1996AD01F92CA30C57D0BF217C11C
                                    Malicious:true
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e08
                                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1394
                                    Entropy (8bit):5.340883346054895
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4bE4KnKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84F0:MIHK5HKXE1qHbHKnYHKhQnoPtHoxHhAR
                                    MD5:B51A52A837298BCF7A6EB58551AEF99C
                                    SHA1:61EEFCC20AC255B8651769E5C48E27B2A983FC4A
                                    SHA-256:1D393FBB3CE754EA699462C2778587A7F2451EB23BE2BD5084C95A46B20BE8AF
                                    SHA-512:138544399787651C847837719606197E539857206CCB271E0F4A86E2017FBADABADF5A235B6F6F1DA8ADE7EF29DBA3115CD1996AD01F92CA30C57D0BF217C11C
                                    Malicious:false
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e08
                                    Process:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1300
                                    Entropy (8bit):5.1160203935308814
                                    Encrypted:false
                                    SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK05xtn:cbk4oL600QydbQxIYODOLedq3Sj
                                    MD5:BBD60B5934FEFE16364F0B45F08803EB
                                    SHA1:E60E779BD933C4FCEE0E15BE3320693A4870BD6F
                                    SHA-256:7BDEBD98B4E35A8C8D6200E016F2DB9B30B5248770491A217CBCDE110639AD80
                                    SHA-512:FB3852D91CF3650FEEE9EB158AE31EE0F50282B1FFA46DF508CD98D9A1F5A18F42BAFF0E1E1679676043CD8FF2F3A4514380989028CAC0571C7714E156E68104
                                    Malicious:true
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                    Process:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1310
                                    Entropy (8bit):5.109425792877704
                                    Encrypted:false
                                    SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                    MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                    SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                    SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                    SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                    Process:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):232
                                    Entropy (8bit):7.024371743172393
                                    Encrypted:false
                                    SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                    MD5:32D0AAE13696FF7F8AF33B2D22451028
                                    SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                    SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                    SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                    Malicious:false
                                    Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                    Process:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    File Type:Non-ISO extended-ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):8
                                    Entropy (8bit):3.0
                                    Encrypted:false
                                    SSDEEP:3:Fln:v
                                    MD5:7FB7ABD229F9A0F89181486D7EA04586
                                    SHA1:1A6F55BB4979E5D352DADDAC1D2EF4C4E2AC8761
                                    SHA-256:EBDFB2D20090C2B0EBAFC8B8EC78F0037F43FC0DD1226454804DFD726A8531D4
                                    SHA-512:98ABBA87DCCA807971F4ED1E926D262F5811CA78184FC75104B6A26D965B69AE37D4CB9B8CD1D10A998BFE9253FCDDE6CCBA2F1CE4C08D52BFBD153814528C43
                                    Malicious:true
                                    Preview:.6P.N..H
                                    Process:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    File Type:data
                                    Category:modified
                                    Size (bytes):24
                                    Entropy (8bit):4.501629167387823
                                    Encrypted:false
                                    SSDEEP:3:9bzY6oRDIvYk:RzWDI3
                                    MD5:ACD3FB4310417DC77FE06F15B0E353E6
                                    SHA1:80E7002E655EB5765FDEB21114295CB96AD9D5EB
                                    SHA-256:DC3AE604991C9BB8FF8BC4502AE3D0DB8A3317512C0F432490B103B89C1A4368
                                    SHA-512:DA46A917DB6276CD4528CFE4AD113292D873CA2EBE53414730F442B83502E5FAF3D1AE87BFA295ADF01E3B44FDBCE239E21A318BFB2CCD1F4753846CB21F6F97
                                    Malicious:false
                                    Preview:9iH...}Z.4..f..J".C;"a
                                    Process:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):40
                                    Entropy (8bit):5.153055907333276
                                    Encrypted:false
                                    SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                    MD5:4E5E92E2369688041CC82EF9650EDED2
                                    SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                    SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                    SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                    Malicious:false
                                    Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                                    Process:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):327432
                                    Entropy (8bit):7.99938831605763
                                    Encrypted:true
                                    SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                    MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                    SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                    SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                    SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                    Malicious:false
                                    Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                    Process:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):37
                                    Entropy (8bit):4.540402352056965
                                    Encrypted:false
                                    SSDEEP:3:oNWXp5vXOrN:oNWXpFep
                                    MD5:539311B7FFA0BBE75465062AFA248697
                                    SHA1:100651CB385C480A88DD975894C1319281FEC5D9
                                    SHA-256:C88DA514977455D956906E192247F714A5191C861138170EB0E77265F6446F57
                                    SHA-512:E9370F2C60DF1CAE69475D80B2DA0BF70909EDB9728026DD1EF126D37BA9FB3B64FC4AE7E2E483FC009324B0BCC4F6669E5D3C2A4A2AA96B14BE38EBC8544A7C
                                    Malicious:false
                                    Preview:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.037105846383947
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    • DOS Executable Generic (2002/1) 0.01%
                                    File name:2P4OWESFNE.exe
                                    File size:1000448
                                    MD5:69956e7cc66b2e6b4a15dc779d63b459
                                    SHA1:63e96a654fd677da56b73d14fc588a3581e8d57e
                                    SHA256:38403140be153292b9fa08bcd87dae41e0f9e26327aaac95a05fea54decc291b
                                    SHA512:ffa9729470e7cfde290ce3a406637d0b1e35a9d3af912f826c879ff4021fb4ac2de0a2adb183b881836ca3e073ae196e8b50f9be91ff10091e0d2700b4b1dc77
                                    SSDEEP:12288:0QhLuyAHRzxXSG2tmkgHAkC7trKPGCoY3qyfnkgl9TnmVuLkQDsGE1qF:lhLuyy6LtC+7ZKoifnHTn01GEc
                                    TLSH:FF25D0272AEA5F0BD02463B8C1E1D6F193A99C51E027C38B6FC67D9FB0A77209750752
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....g...............0......J........... ... ....@.. ....................................@................................
                                    Icon Hash:ce9c9496e4949c9e
                                    Entrypoint:0x4f1792
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0xDF67EFF8 [Sat Oct 9 03:26:48 2088 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xf17400x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xf20000x46b0.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xf80000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xf17240x1c.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xef7980xef800False0.7431202293188935data7.049986344828056IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xf20000x46b00x4800False0.5461154513888888data6.168153894151936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xf80000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    RT_ICON0xf20e80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                                    RT_GROUP_ICON0xf63100x14data
                                    RT_VERSION0xf63240x38cPGP symmetric key encrypted data - Plaintext or unencrypted data
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    192.168.2.379.110.62.1874970840322816766 09/24/22-10:06:53.636236TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497084032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970340322025019 09/24/22-10:06:04.969403TCP2025019ET TROJAN Possible NanoCore C2 60B497034032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970040322025019 09/24/22-10:05:35.183673TCP2025019ET TROJAN Possible NanoCore C2 60B497004032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970740322025019 09/24/22-10:06:45.272787TCP2025019ET TROJAN Possible NanoCore C2 60B497074032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970440322816718 09/24/22-10:06:19.996354TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497044032192.168.2.379.110.62.187
                                    79.110.62.187192.168.2.34032497042810290 09/24/22-10:06:20.563916TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 140324970479.110.62.187192.168.2.3
                                    192.168.2.379.110.62.1874970940322816766 09/24/22-10:06:59.700744TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497094032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970240322816766 09/24/22-10:05:50.043192TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497024032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970240322025019 09/24/22-10:05:48.835604TCP2025019ET TROJAN Possible NanoCore C2 60B497024032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970540322816766 09/24/22-10:06:30.444040TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497054032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970640322025019 09/24/22-10:06:38.454304TCP2025019ET TROJAN Possible NanoCore C2 60B497064032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970340322816766 09/24/22-10:06:11.169922TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497034032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970540322025019 09/24/22-10:06:29.331655TCP2025019ET TROJAN Possible NanoCore C2 60B497054032192.168.2.379.110.62.187
                                    79.110.62.187192.168.2.34032497002841753 09/24/22-10:05:39.949299TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)40324970079.110.62.187192.168.2.3
                                    192.168.2.379.110.62.1874971140322025019 09/24/22-10:07:30.021020TCP2025019ET TROJAN Possible NanoCore C2 60B497114032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970640322816766 09/24/22-10:06:39.820524TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497064032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874971040322816766 09/24/22-10:07:06.791276TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497104032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970940322025019 09/24/22-10:06:58.980960TCP2025019ET TROJAN Possible NanoCore C2 60B497094032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970440322025019 09/24/22-10:06:16.738677TCP2025019ET TROJAN Possible NanoCore C2 60B497044032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970440322816766 09/24/22-10:06:19.996354TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497044032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970040322816766 09/24/22-10:05:41.035836TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497004032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874971040322025019 09/24/22-10:07:05.908978TCP2025019ET TROJAN Possible NanoCore C2 60B497104032192.168.2.379.110.62.187
                                    79.110.62.187192.168.2.34032497032841753 09/24/22-10:06:09.982472TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)40324970379.110.62.187192.168.2.3
                                    192.168.2.379.110.62.1874970740322816766 09/24/22-10:06:46.278312TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497074032192.168.2.379.110.62.187
                                    192.168.2.379.110.62.1874970840322025019 09/24/22-10:06:51.652364TCP2025019ET TROJAN Possible NanoCore C2 60B497084032192.168.2.379.110.62.187
                                    79.110.62.187192.168.2.34032497112841753 09/24/22-10:07:35.065229TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)40324971179.110.62.187192.168.2.3
                                    79.110.62.187192.168.2.34032497102841753 09/24/22-10:07:20.944242TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)40324971079.110.62.187192.168.2.3
                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 24, 2022 10:05:34.885418892 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:34.916404963 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:34.916532040 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.183672905 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.263597012 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.300030947 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.330948114 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.564114094 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.695219994 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.777033091 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.799921036 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.799948931 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.799964905 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.799983025 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.800055027 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.800079107 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.830508947 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.830534935 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.830550909 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.830566883 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.830583096 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.830599070 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.830615044 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.830631018 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.830636978 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.830688000 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.861063957 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.861093998 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.861110926 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.861129045 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.861145973 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.861164093 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.861181021 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.861197948 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.861201048 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.861215115 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.861231089 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.861232042 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.861258030 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.861262083 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.861279011 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.861294031 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.861299992 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.861311913 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.861340046 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.861399889 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.892014027 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.892045021 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.892061949 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.892079115 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.892102003 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.892127991 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.892174006 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.892282963 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.892323017 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.892326117 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.892399073 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.892438889 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.892474890 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.892606020 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.892657995 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.892678976 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.892843008 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.892874956 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.892887115 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.892959118 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.892997026 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.893032074 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.893075943 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.893115044 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.893115997 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.893151999 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.893188000 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.893240929 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.893258095 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.893300056 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.893320084 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.893356085 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.893388987 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.893404007 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.893404961 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.893461943 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.893556118 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.893593073 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.893634081 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.893637896 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.893677950 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.893721104 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.910644054 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.922661066 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.922688007 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.922704935 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.922720909 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.922736883 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.922760963 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.922770977 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.922777891 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.922789097 CEST40324970079.110.62.187192.168.2.3
                                    Sep 24, 2022 10:05:35.922817945 CEST497004032192.168.2.379.110.62.187
                                    Sep 24, 2022 10:05:35.922841072 CEST40324970079.110.62.187192.168.2.3
                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 24, 2022 10:05:34.848011971 CEST5892153192.168.2.38.8.8.8
                                    Sep 24, 2022 10:05:34.867635012 CEST53589218.8.8.8192.168.2.3
                                    Sep 24, 2022 10:05:48.781843901 CEST4997753192.168.2.38.8.8.8
                                    Sep 24, 2022 10:05:48.801285982 CEST53499778.8.8.8192.168.2.3
                                    Sep 24, 2022 10:06:04.869580984 CEST5784053192.168.2.38.8.8.8
                                    Sep 24, 2022 10:06:04.889889956 CEST53578408.8.8.8192.168.2.3
                                    Sep 24, 2022 10:06:16.652563095 CEST5799053192.168.2.38.8.8.8
                                    Sep 24, 2022 10:06:16.674304962 CEST53579908.8.8.8192.168.2.3
                                    Sep 24, 2022 10:06:28.701721907 CEST5238753192.168.2.38.8.8.8
                                    Sep 24, 2022 10:06:28.723304033 CEST53523878.8.8.8192.168.2.3
                                    Sep 24, 2022 10:06:38.351696968 CEST5692453192.168.2.38.8.8.8
                                    Sep 24, 2022 10:06:38.371471882 CEST53569248.8.8.8192.168.2.3
                                    Sep 24, 2022 10:06:45.221066952 CEST6062553192.168.2.38.8.8.8
                                    Sep 24, 2022 10:06:45.238692045 CEST53606258.8.8.8192.168.2.3
                                    Sep 24, 2022 10:06:51.599821091 CEST4930253192.168.2.38.8.8.8
                                    Sep 24, 2022 10:06:51.619574070 CEST53493028.8.8.8192.168.2.3
                                    Sep 24, 2022 10:06:58.926563025 CEST5397553192.168.2.38.8.8.8
                                    Sep 24, 2022 10:06:58.948337078 CEST53539758.8.8.8192.168.2.3
                                    Sep 24, 2022 10:07:05.830044031 CEST5113953192.168.2.38.8.8.8
                                    Sep 24, 2022 10:07:05.848072052 CEST53511398.8.8.8192.168.2.3
                                    Sep 24, 2022 10:07:29.964632034 CEST5295553192.168.2.38.8.8.8
                                    Sep 24, 2022 10:07:29.986562967 CEST53529558.8.8.8192.168.2.3
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Sep 24, 2022 10:05:34.848011971 CEST192.168.2.38.8.8.80x90f9Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:05:48.781843901 CEST192.168.2.38.8.8.80xe25eStandard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:06:04.869580984 CEST192.168.2.38.8.8.80x475Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:06:16.652563095 CEST192.168.2.38.8.8.80xcadaStandard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:06:28.701721907 CEST192.168.2.38.8.8.80xfa4bStandard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:06:38.351696968 CEST192.168.2.38.8.8.80x7280Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:06:45.221066952 CEST192.168.2.38.8.8.80xb3e8Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:06:51.599821091 CEST192.168.2.38.8.8.80x2558Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:06:58.926563025 CEST192.168.2.38.8.8.80x6094Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:07:05.830044031 CEST192.168.2.38.8.8.80x283cStandard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:07:29.964632034 CEST192.168.2.38.8.8.80xea36Standard query (0)jasonbourne.bounceme.netA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Sep 24, 2022 10:05:34.867635012 CEST8.8.8.8192.168.2.30x90f9No error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:05:48.801285982 CEST8.8.8.8192.168.2.30xe25eNo error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:06:04.889889956 CEST8.8.8.8192.168.2.30x475No error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:06:16.674304962 CEST8.8.8.8192.168.2.30xcadaNo error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:06:28.723304033 CEST8.8.8.8192.168.2.30xfa4bNo error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:06:38.371471882 CEST8.8.8.8192.168.2.30x7280No error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:06:45.238692045 CEST8.8.8.8192.168.2.30xb3e8No error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:06:51.619574070 CEST8.8.8.8192.168.2.30x2558No error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:06:58.948337078 CEST8.8.8.8192.168.2.30x6094No error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:07:05.848072052 CEST8.8.8.8192.168.2.30x283cNo error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false
                                    Sep 24, 2022 10:07:29.986562967 CEST8.8.8.8192.168.2.30xea36No error (0)jasonbourne.bounceme.net79.110.62.187A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Target ID:0
                                    Start time:10:05:01
                                    Start date:24/09/2022
                                    Path:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\2P4OWESFNE.exe"
                                    Imagebase:0x20000
                                    File size:1000448 bytes
                                    MD5 hash:69956E7CC66B2E6B4A15DC779D63B459
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.317159998.0000000002568000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.323536613.0000000003951000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.323536613.0000000003951000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.323536613.0000000003951000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.323536613.0000000003951000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.320178874.0000000003555000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Reputation:low

                                    Target ID:10
                                    Start time:10:05:21
                                    Start date:24/09/2022
                                    Path:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    Imagebase:0xb0000
                                    File size:1000448 bytes
                                    MD5 hash:69956E7CC66B2E6B4A15DC779D63B459
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low

                                    Target ID:11
                                    Start time:10:05:22
                                    Start date:24/09/2022
                                    Path:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    Imagebase:0x850000
                                    File size:1000448 bytes
                                    MD5 hash:69956E7CC66B2E6B4A15DC779D63B459
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.545805454.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.545805454.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000000.311191616.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.582445955.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.582899602.0000000007350000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.582899602.0000000007350000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000B.00000002.582899602.0000000007350000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.582899602.0000000007350000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.581802158.0000000007180000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.582528929.0000000007320000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.582528929.0000000007320000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000B.00000002.582528929.0000000007320000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.582528929.0000000007320000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.583497422.0000000007390000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.583497422.0000000007390000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000B.00000002.583497422.0000000007390000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.583497422.0000000007390000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.577143081.00000000062F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.577143081.00000000062F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000B.00000002.577143081.00000000062F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.577143081.00000000062F0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.582324415.0000000007300000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.550686759.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.567018160.00000000048B7000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.566126701.0000000004842000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.562954773.0000000004671000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.582073536.00000000072E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.582073536.00000000072E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000B.00000002.582073536.00000000072E0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.582073536.00000000072E0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.582795269.0000000007340000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.582795269.0000000007340000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000B.00000002.582795269.0000000007340000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.582795269.0000000007340000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.577485717.0000000006390000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.568370273.00000000049A2000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.578555669.0000000006760000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.578555669.0000000006760000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000B.00000002.578555669.0000000006760000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.578555669.0000000006760000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.582233122.00000000072F0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.581897432.0000000007190000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000003.348304401.00000000068C1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.581164411.0000000006EC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.581164411.0000000006EC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000B.00000002.581164411.0000000006EC0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.581164411.0000000006EC0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    Reputation:low

                                    Target ID:12
                                    Start time:10:05:28
                                    Start date:24/09/2022
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpD28D.tmp
                                    Imagebase:0x11c0000
                                    File size:185856 bytes
                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:13
                                    Start time:10:05:29
                                    Start date:24/09/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff745070000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:14
                                    Start time:10:05:30
                                    Start date:24/09/2022
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpDA9C.tmp
                                    Imagebase:0x11c0000
                                    File size:185856 bytes
                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:15
                                    Start time:10:05:30
                                    Start date:24/09/2022
                                    Path:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\2P4OWESFNE.exe 0
                                    Imagebase:0xbe0000
                                    File size:1000448 bytes
                                    MD5 hash:69956E7CC66B2E6B4A15DC779D63B459
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000F.00000002.398922786.00000000032D8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low

                                    Target ID:16
                                    Start time:10:05:31
                                    Start date:24/09/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff745070000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:17
                                    Start time:10:05:33
                                    Start date:24/09/2022
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                    Imagebase:0xc50000
                                    File size:1000448 bytes
                                    MD5 hash:69956E7CC66B2E6B4A15DC779D63B459
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000011.00000002.407355851.0000000003078000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low

                                    Target ID:18
                                    Start time:10:05:40
                                    Start date:24/09/2022
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                    Imagebase:0x9a0000
                                    File size:1000448 bytes
                                    MD5 hash:69956E7CC66B2E6B4A15DC779D63B459
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    Target ID:19
                                    Start time:10:05:51
                                    Start date:24/09/2022
                                    Path:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\2P4OWESFNE.exe
                                    Imagebase:0x8d0000
                                    File size:1000448 bytes
                                    MD5 hash:69956E7CC66B2E6B4A15DC779D63B459
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.439587910.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.442755164.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Reputation:low

                                    Target ID:20
                                    Start time:10:06:00
                                    Start date:24/09/2022
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Imagebase:0x550000
                                    File size:1000448 bytes
                                    MD5 hash:69956E7CC66B2E6B4A15DC779D63B459
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.454333239.0000000002981000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.454333239.0000000002981000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000014.00000002.454333239.0000000002981000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Reputation:low

                                    Target ID:21
                                    Start time:10:06:07
                                    Start date:24/09/2022
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Imagebase:0x750000
                                    File size:1000448 bytes
                                    MD5 hash:69956E7CC66B2E6B4A15DC779D63B459
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    No disassembly